Multiple weaknesses exist in AppLock, a popular lock application for Android devices that boasts over 100 million users.
Google and Mozilla today announced they’ve settled on a timeframe to permanently deprecate the shaky RC4 encryption algorithm.
Networked devices behind a firewall are at risk to attack because of poor authentication in the UPnP protocol in most home routers.
The initial results of a survey conducted by a Google researcher show that a large part of public vulnerability research involves fuzzing tools.
Google researcher Michał Zalewski, also known as “lcamtuf,” has carried out a study to determine how most security flaws are discovered, and by whom.
Live Webcast: Wednesday, Sept. 2nd, 2015 at 1:00 pm ET
You already know the power of application segmentation to deliver data center and cloud security—now you can take segmentation to the next level. Nano-segmentation is finally a reality.
A new banking Trojan has been used to target the customers of more than a dozen Japanese banks, IBM reported on Monday.
Dubbed “Shifu,” the Japanese word for thief, the banking Trojan has been around since at least April, and it’s designed to target Japanese banks and select e-banking platforms used in Europe.
A group of hackers on Tuesday claimed they had downed the website of Britain's lead law enforcement agency after it arrested six people over similar attacks.
The National Crime Agency (NCA) website was offline for around an hour after suffering a Distributed Denial of Service (DDoS) attack, claimed by hacking group Lizard Squad.
The U.S. government is purportedly readying economic sanctions against China and is prepared to call out several Chinese companies and individuals for cyber espionage.
Malware that leverages a computer’s graphics processing unit (GPU) made headlines earlier this year when researchers developed several experimental threats designed to use the GPU for enhanced stealthiness. However, experts from Intel Security believe such malware still leaves traces that can be picked up by endpoint protection solutions.
The CERT/CC is warning users that some Belkin home routers contain a number of vulnerabilities that could allow an attacker to spoof DNS responses, intercept credentials sent in cleartext, access the web management interface, and take other actions on vulnerable routers. The vulnerabilities affect the Belkin N600 DB Wireless Dual Band N+ router, model F9K1102 v2 with […]