Experts Find DOM XSS Flaw in “+1” Button of Google Plus - Video

Experts Find DOM XSS Flaw in “+1” Button of Google Plus - Video

The vulnerability was found with the aid of a tool called DOMinatorPro

Researchers Find Smishing Vulnerability in Android, All Versions Affected – Video

Researchers Find Smishing Vulnerability in Android, All Versions Affected – Video

Google is already working on addressing the security hole

“China Hacked by Anonymous” YouTube Video Promotes Facebook Hack Tool

“China Hacked by Anonymous” YouTube Video Promotes Facebook Hack Tool

The application hides an information-stealing Trojan

Cybercriminals Continue to Improve Skype-Spreading Malware

Cybercriminals Continue to Improve Skype-Spreading Malware

New languages and download locations have been added

Huawei Wants to Ask German Security Researcher for Help in Patching Up Devices

Huawei Wants to Ask German Security Researcher for Help in Patching Up Devices

Felix Lindner has identified a number of vulnerabilities in the company's devices

Georgian CERT Uses Malware to Identify and Photograph Russian Hacker

Georgian CERT Uses Malware to Identify and Photograph Russian Hacker

The man is believed to be responsible for the Georbot botnet

Security Experts Warn About Android Apps Bundled with sellAring Ads

Security Experts Warn About Android Apps Bundled with sellAring Ads

Aggressive ad platforms can ruin a developer's reputation

Malware Responsible for Israeli Police Department Shutdown Analyzed

Malware Responsible for Israeli Police Department Shutdown Analyzed

Trend Micro experts have obtained a sample of the email designed to spread a RAT

Malware Uses Mouse Actions, “Sleep” Mode to Evade Detection

Malware Uses Mouse Actions, “Sleep” Mode to Evade Detection

Researchers explain how malicious elements hide from threat analysis systems

Gamarue Malware Hides in Hotel Booking Confirmations Sent to German Users

Gamarue Malware Hides in Hotel Booking Confirmations Sent to German Users

Trend Micro experts have analyzed this particular spam campaign

Researchers Highlight the Pros and Cons of Windows 8 Security Systems

Researchers Highlight the Pros and Cons of Windows 8 Security Systems

Windows Defender, UEFI and ELAM analyzed by Trend Micro experts

Security Experts: We Hope Windows 8 Is Immune to Old Exploitation Techniques

Security Experts: We Hope Windows 8 Is Immune to Old Exploitation Techniques

FireEye researchers say protocol standards must be strictly enforced

Faulty SSL Certificate Validation Exposes Apps to MitM Attacks, Researchers Find

Faulty SSL Certificate Validation Exposes Apps to MitM Attacks, Researchers Find

Amazon libraries, PayPal's merchant SDK, and various shopping carts are affected

RSA, AMD, Intel, Lockheed Martin and Honeywell Team Up for Cyber Security Alliance

RSA, AMD, Intel, Lockheed Martin and Honeywell Team Up for Cyber Security Alliance

The big players hope they can get the private sector and the government to work together

US-CERT Warns About DKIM Keys After Expert Finds Google Emails Easy to Spoof

US-CERT Warns About DKIM Keys After Expert Finds Google Emails Easy to Spoof

Companies such as Yahoo!, Amazon, PayPal, eBay and HSBC are also affected

Flaws in Airline Boarding Passes Could Allow Terrorists to Carry Illegal Items on Board

Flaws in Airline Boarding Passes Could Allow Terrorists to Carry Illegal Items on Board

The barcode reveals if the passenger will undergo conventional screening or not

Android ROM Installed on 2.5 Million Devices Found to Log Unlock Patterns

Android ROM Installed on 2.5 Million Devices Found to Log Unlock Patterns

Developers have addressed the issue that plagued Cyanogen Mod

 
Want more? Browse: