Remote code execution vulnerabilities have been found in the Android operating system, and patches released for Nexus devices.
But what about your smartphone? Is there a patch for you, and can you get your hands on it?
Critical security patches have been released for Microsoft and Adobe products. Have you installed them yet?
Sooner or later you are going to have to address the Flash problem on your computers.
And there doesn’t seem a better time with a zero-day vulnerability being actively exploited by an organised hacking gang.
Vulnerable hospital equipment details can be found online, two security researchers have found.
It’s time to update Flash once again, and don’t forget to reduce the attack surface by enabling “Click to Play”… or uninstall it altogether.
An expert says that a popular Belkin router contains numerous vulnerabilities, making it extremely susceptible to attacks.
Dolphin and Mercury Android browsers have major vulnerabilities, allowing for remote code execution and arbitrary reading and writing of files.
Internet Defense Prize goes to researchers from the Georgia Institute of Technology for designing a tool that detects a new class of C++ vulnerabilities.
The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.
The Information Commissioner’s Office is “making enquiries” into a major data breach at Carphone Warehouse in the UK.
An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP.
Is that really an appropriate level of security for computers that could be holding patients’ medical information?
As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.
Cars which are capable of receiving instructions via the internet (such as software updates) are potentially more at risk of being hacked or meddled with than those which don’t.
Risk analysis is the first step towards managing risks, particularly when it comes to cyber risks. This recorded webinar introduces and explains key concepts, with links to several useful risk assessment tools.
Millions of WordPress sites are vulnerable to a scripting flaw found in two popular plugins, one of which can be found in the default installation of the blogging platform.
Security researchers discovered a vulnerability on the Hilton HHonors website, making it straightforward to hijack any other user’s account.