Retailers beware: A new Trojan program targets point-of-sale (PoS) terminals, stealing payment card data that can then be abused by cybercriminals.
Stories by Lucian Constantin
You don't need to be the NSA to tap calls on Cisco's SPA 300 and 500 IP phones: An authentication flaw allows potential attackers to do that by default.
Security researchers who participated in the Pwn2Own hacking contest this week demonstrated remote code execution exploits against the top four browsers, and also hacked the widely used Adobe Reader and Flash Player plug-ins.
Cybercriminals are exploiting newly patched vulnerabilities faster, a sign that users and companies need to improve their software updating habits.
More than 700,000 ADSL routers provided to customers by ISPs around the world contain serious flaws that allow remote hackers to take control of them.
The mystery high-severity flaw that people were expected to be fixed in OpenSSL is no Heartbleed, but it is serious and users should update.
After a security enthusiast discovered a loophole that allowed him to register a valid SSL certificate for Microsoft's live.fi domain, he tried to responsibly disclose the issue. But instead of thanks he got locked out of his email, phone, Xbox and online storage accounts.
Microsoft updated its Enhanced Mitigation Experience Toolkit (EMET), a free exploit prevention tool, to protect against attacks that attempt to bypass Internet Explorer's sandbox using VBScript.
Microsoft released an update to blacklist an SSL certificate for one of its domain names that was issued to an unauthorized third party.
In an effort to simplify authentication for its services, Yahoo has introduced a new mechanism that allows users to log in with temporary passwords that are sent to their mobile phones.
Have you ever heard stories about malicious USB thumb drives frying laptops and thought they were far fetched? An electronics engineer heard them too, and then set out to create a prototype.
A new malware program attempts to extort money from gamers by encrypting game saves and other user-generated files for popular computer games.
Over a million WordPress websites that use a popular plug-in to optimize their search engine results are at risk of being hacked if they don't apply a newly released patch.
As security researchers continue to analyze malware used by a sophisticated espionage group dubbed the Equation, more clues surface that point to the U.S. National Security Agency being behind it.
If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
- Test Analyst - Contact Centre Technologies VIC
- Senior IT Business Analyst VIC
- Senior Project Manager, Technology Upgrade & Refresh NSW
- Sr System Analyst ACT
- Business Analyst - Digital/Financial Services NSW
- Project Manager QLD
- Senior Business Intelligence Manager NSW
- Scrum Master NSW
- Contract Systems Analyst (C++/JAVA/SQL) 160505/SA/971 Asia
- BPM Consultant VIC
- CSO Live Webcast: Hear from KuppingerCole Analysts and ForgeRock on User-Managed Access. Register now
- REGISTER NOW! The TCS Global Insights Knowledge Sharing Program is up and running. Feb-May. Sydney.
- F5 Security Hub NEW Look - Try us out today!
- APJ businesses think they will be breached: Here's why: Read the article NOW
- INSIGHTS: The State of Cloud Storage & Collaboration 2016 - Take this 5 min survey and you could WIN a $500 Visa gift card : START SURVEY NOW