A group of hackers that have been targeting military and government organizations from NATO countries have borrowed code from a leaked online banking Trojan.
Stories by Lucian Constantin
The Ashley Madison developers stored sensitive credentials like database passwords, AWS API secrets, authentication tokens and SSL private keys in their source code repositories.
Kaspersky Lab has released an emergency patch for some of its antivirus products after a security researcher found a critical vulnerability that could allow hackers to compromise computers.
A LinkedIn-based intelligence gathering campaign has been using fake LinkedIn profiles to map out the professional networks of IT security experts.
The Shopperz adware program uses a cunning technique to make DNS (Domain Name System) hijacking harder to detect and fix.
A security analysis of nine baby monitors from different manufacturers revealed serious vulnerabilities and design flaws that could allow hackers to hijack their video feeds or take full control of the devices.
The average company has more than one gambling application installed on some of its employees' mobile devices, and in some cases as many as 35.
The Belkin N600 DB wireless dual band router model has unpatched vulnerabilities that could allow hackers to compromise affected devices.
Malware that runs inside GPUs (graphics processing units) can be harder to detect, but is not completely invisible to security products.
The Linux Foundation published a list of security recommendations for hardening Linux workstations used by systems administrators.
Security researchers from Symantec have identified 49 more modules of the sophisticated Regin cyberespionage platform that many believe is used by the U.S. National Security Agency and its close allies.
BitTorrent fixed a vulnerability that would have allowed attackers to hijack BitTorrent applications used by hundreds of millions of users in order to amplify distributed denial-of-service (DDoS) attacks.
Several DSL routers from different manufacturers contain a guessable hard-coded password that allows accessing the devices with a hidden administrator account.
Administrators of Agora, the largest online black marketplace operating on the Tor anonymity network, decided to temporarily suspend the website because of possible attacks based on recent methods of exposing Tor Hidden Services.
An application hosted in Google Play until yesterday took advantage for months of a flaw in the TeamViewer remote support tool for Android in order to enable screen recording on older devices.
- Microsoft Dynamics AX Functional Consultant Advanced Warehouse Management ACT
- Business Process Specialist/Analyst NSW
- Cloud Security Services Specialist VIC
- Systems Engineer | Defence & Federal Govt | NV1 / NV2 clearance ACT
- Application Senior Project Manager ACT
- Business Analyst NSW
- Data Centre Engineer NSW
- Network Capacity Planner VIC
- Digital Solutions Manager NSW
- Microsoft Dynamics AX Manufacturing Consultant WA