Dolphin and Mercury Android browsers have major vulnerabilities, allowing for remote code execution and arbitrary reading and writing of files.
Internet Defense Prize goes to researchers from the Georgia Institute of Technology for designing a tool that detects a new class of C++ vulnerabilities.
The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.
The Information Commissioner’s Office is “making enquiries” into a major data breach at Carphone Warehouse in the UK.
An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP.
Is that really an appropriate level of security for computers that could be holding patients’ medical information?
As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.
Cars which are capable of receiving instructions via the internet (such as software updates) are potentially more at risk of being hacked or meddled with than those which don’t.
Risk analysis is the first step towards managing risks, particularly when it comes to cyber risks. This recorded webinar introduces and explains key concepts, with links to several useful risk assessment tools.
Millions of WordPress sites are vulnerable to a scripting flaw found in two popular plugins, one of which can be found in the default installation of the blogging platform.
Security researchers discovered a vulnerability on the Hilton HHonors website, making it straightforward to hijack any other user’s account.
A vulnerability in Cisco’s SPA300 and SPA500 IP phones could allow hackers to eavesdrop on private conversations from anywhere in the world, reports The Register.
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.
A security researcher describes how malware could infect your Mac’s boot ROM, and spy on your activities, with little chance of you ever realising.
Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.
There is growing concern that in the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.
Yesterday, security researcher Jonathan Hall, of a company called Future South Technologies, accused Yahoo of having suffered a serious security breach via the recently discovered Shellshock vulnerability in Bash.
This week, a serious software vulnerability, which rapidly became known as the ‘Bash Bug’ or ‘Shellshock’ dominated the headlines, as two other faked news stories showed that hoaxes can fool the world very easily these days.