Experts Unhappy with Oracle’s Java Cloud Patching Process, Vulnerability Details Published

Experts Unhappy with Oracle’s Java Cloud Patching Process, Vulnerability Details Published

Security Explorations says Oracle is still working on vulnerability handling policies

FireEye Analyzes the 11 Zero-Day Vulnerabilities It Uncovered in 2013

FireEye Analyzes the 11 Zero-Day Vulnerabilities It Uncovered in 2013

The white paper published by the security firm is called "Less Than Zero"

Hackers Can Unlock Tesla Cars by Stealing Owners’ Passwords

Hackers Can Unlock Tesla Cars by Stealing Owners’ Passwords

A security consultant has presented his findings at a recent conference in Singapore

Pre-Installation Service Used to Install Malware on Android Phones in China

Pre-Installation Service Used to Install Malware on Android Phones in China

The service in question is used to install apps on over 1 million devices each month

Google Experts: 21 of Top 25 News Organizations Targeted by State-Sponsored Hackers <em>Reuters</em>

Google Experts: 21 of Top 25 News Organizations Targeted by State-Sponsored Hackers Reuters

The researchers have presented their findings at Black Hat in Singapore

Cybercriminals Hijack WordPress Websites with Free Premium Plugins

Cybercriminals Hijack WordPress Websites with Free Premium Plugins

Sucuri experts have identified a number of websites that offer such plugins

Unpatched PHP Installations Enable Cybercriminals to Exploit Old Vulnerability

Unpatched PHP Installations Enable Cybercriminals to Exploit Old Vulnerability

The PHP flaw was found back in May 2012 and it was patched shortly after

BlackOS: New Malicious Software Used by Cybercriminals to Redirect Traffic

BlackOS: New Malicious Software Used by Cybercriminals to Redirect Traffic

A new cybercrime package from the creators of "Tale of the North"

Alleged Operator of SSNDOB Identity Theft Service Identified

Alleged Operator of SSNDOB Identity Theft Service Identified

Experts believe he's a 24-year-old from the disputed territory of Abkhazia

New ZeuS Generates Income for Its Masters by Displaying Sites on Infected Computers

New ZeuS Generates Income for Its Masters by Displaying Sites on Infected Computers

Another variant is designed to steal Bitcoin wallets

Expert Finds RCE Flaw in Yahoo After Logging in with “Admin/Admin” Credentials

Expert Finds RCE Flaw in Yahoo After Logging in with “Admin/Admin” Credentials

Behrouz Sadeghipour is the security researcher who uncovered the vulnerability

Security Researcher Accidentally Crashes Google Play When Testing POC App

Security Researcher Accidentally Crashes Google Play When Testing POC App

This is the second time this Turkish expert is involved in such a story

ESET Uncovers Server Botnet That Infected over 25,000 UNIX Machines

ESET Uncovers Server Botnet That Infected over 25,000 UNIX Machines

Researchers say this is the largest server botnet they’ve seen so far

Cybercriminals Leverage Mass Stabbing in China to Distribute Gh0st RAT

Cybercriminals Leverage Mass Stabbing in China to Distribute Gh0st RAT

A backdoor is hidden inside a harmless-looking document file

Hackers Who Hijacked Mt. Gox CEO’s Blog Tricked People into Installing Bitcoin Stealer

Hackers Who Hijacked Mt. Gox CEO’s Blog Tricked People into Installing Bitcoin Stealer

Kaspersky experts have analyzed the files “leaked” by the hackers

Researchers Rewarded with a Total of $850,000 / €613,000 at Pwn2Own 2014

Researchers Rewarded with a Total of $850,000 / €613,000 at Pwn2Own 2014

Google Chrome has been hacked on the second day of the competition

FireEye Finds Connection Between “Siesta” and Notorious Chinese Espionage Unit

FireEye Finds Connection Between “Siesta” and Notorious Chinese Espionage Unit

Is APT1 behind the recently uncovered Siesta espionage campaign?

 
Want more? Browse: