A new malware program called GreenDispenser infects automated teller machines (ATMs) and allows attackers to extract cash on command.
Stories by Lucian Constantin
The fingerprints of 5.6 million people have been stolen as a result of hackers penetrating the computer systems of the U.S. Office of Personnel Management earlier this year.
Security researchers have identified over 4000 iOS apps that have malicious code added by a rogue version of the Xcode development tool.
Zerodium, an exploit acquisition company, promises to pay $1 million to researchers who provide it with an exclusive, browser-based and untethered jailbreak for the latest Apple iOS 9 operating system.
Hewlett-Packard has started building defenses against hackers directly into its printers' firmware.
Attackers have installed malicious firmware on nearly 200 Cisco routers used by businesses from over 30 countries.
Adobe Systems released new updates for Flash Player to patch critical vulnerabilities that could allow attackers to install malware on computers.
Researchers have detected an attack that has installed rogue firmware on business routers in four countries.
Some hackers verify themselves as owners for the websites they compromise in the Google Search Console.
A team of password cracking experts found flaws in the Ashley Madison code that allowed them to recover 11.2 million passwords from data leaked by hackers.
Hackers gained access to over 10 million customer records from U.S. health insurer Excellus BlueCross BlueShield.
The Turla cyberespionage group is hijacking satellite-based Internet connections in order to hide servers from security researchers and law enforcement agencies.
Microsoft fixed a previously unreported vulnerability discovered in the cache of files leaked from Italian surveillance company Hacking Team in July.
A group of hackers that have been targeting military and government organizations from NATO countries have borrowed code from a leaked online banking Trojan.
The Ashley Madison developers stored sensitive credentials like database passwords, AWS API secrets, authentication tokens and SSL private keys in their source code repositories.