- Google project aims to preserve privacy when collecting software stats
- Privileged-account risk multiplies for Australia's cloud-hungry businesses: CyberArk
- Petition targets Apple over ‘spyware' in OS X Yosemite
- Vulnerabilities found in more command-line tools, wget and tnftp get patches
- IT pros turn a blind eye to file sharing practices, report says
Exploits / vulnerabilities - News, Features, and Slideshows
The critical Shellshock vulnerabilities found last month in the Bash Unix shell have motivated security researchers to search for similar flaws in old, but widely used, command-line utilities.
Users of Drupal, one of the most popular content management systems, should consider their sites compromised if they didn't immediately apply a security patch released on Oct. 15.
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
Russia is likely behind a long-running computer spying campaign, although the stealthy attacks leave fewer clues than other state-sponsored attacks, according to a new report from FireEye.
One of the first things a malware analyst does when encountering a suspicious executable file is to extract the text strings found inside it, because they can provide immediate clues about its purpose. This operation has long been considered safe, but it can actually lead to a system compromise, a security researcher found.