Two researchers claim to have found a way to bypass the activation lock feature in iOS that's supposed to prevent anyone from using an iPhone or iPad marked as lost by its owner.
Stories by Lucian Constantin
Poor implementation of encryption in a popular Android remote management application exposes millions of users to data theft and remote code execution attacks.
Researchers have found a new attack technique in the wild that allows a single laptop to take down high-bandwidth enterprise firewalls.
An Israeli hacker found a vulnerability in routers that could have allowed him to take over the public Wi-Fi network of an entire city.
Microsoft has patched 68 vulnerabilities in Windows, Office, Edge, Internet Explorer and SQL Server, two of which have already been exploited by attackers in the wild and three that have been publicly disclosed.
Adobe Systems released security patches for its widely used Flash Player software as well as its Adobe Connect web conferencing platform that's popular in enterprise environments.
Google released a new monthly batch of security patches for Android Monday, fixing a dozen critical vulnerabilities that could allow attackers to compromise devices.
The new Diameter protocol that LTE mobile networks use to communicate with each other can still be abused to launch attacks against users if operators don't take additional security measures, researchers showed.
A VPN is a secure tunnel between two or more computers on the internet. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too.
Owners of WeMo home automation devices should upgrade them to the latest firmware version, which was released this week to fix a critical vulnerability that could allow hackers to fully compromise them.
Researchers have now found that protocols used by operators to offload data connections and voice calls to Wi-Fi can be abused to track mobile subscribers by their unique identification numbers.
Researchers have devised a new malware attack against industrial programmable logic controllers (PLCs) that takes advantage of architectural shortcomings in microprocessors and bypasses current detection mechanisms.
Following similar decisions by Mozilla and Apple, Google plans to reject new certificates issued by two certificate authorities because they violated industry rules and best practices.
Attackers are aggressively attacking Joomla-based websites by exploiting two critical vulnerabilities patched last week.
Security researchers have discovered a new way that allows malware to inject malicious code into other processes without being detected by antivirus programs and other endpoint security systems.
- Senior Back-end Developer/Database Designer SA
- Training & Implementation Manager, Platform NSW
- Practice Manager - Security VIC
- Test Manager - Data Warehouse experience ACT
- Service Monitoring Specialist - Information Security VIC
- Test Lead : Perth Based ACT
- Web Developer - Wordpress NSW
- Senior Technical Business Analyst ACT
- EPAS Technical Support Officers NSW
- Siebel Developers x 8 ACT