The vulnerabilities can be exploited remotely, and fairly easily, by an attacker to hijack sessions and crash the web server of the product.
A man and a woman were sentenced to 14 years for conspiring to steal money in a phishing scheme that was then used to transport criminals into the U.K.
Shortened URLs on Facebook, leading to a risqué webcam video, are actually being used to spread malware.
Apple just recently began encrypting its user iCloud messages that are sent to third-party providers.
The SyScan +360 conference offered a $10,000 prize to anyone who uncovered vulnerabilities in Tesla's Model S car, which the automaker vowed to fix.
Bloomberg revealed that hackers used two zero-day flaws to breach NASDAQ's servers in 2010.
Through their new study, two Microsoft researchers concluded that users should reuse less complicated passwords for accounts that don't require as much protection.
An Israeli broadcasting regulator confirmed that the incident occurred.
The U.K.'s data security watchdog has disclosed a data breach it suffered in the last year.
An Australian daily deals website company, Catch of the Day, alerted its users on Friday of a data breach that impacted one of its websites in 2011.