The Q1 2014 Global DDoS Attack Report reveals that amplification and reflection distributed denial-of-service attacks are on the rise.
A Windows trojan delivered via drive-by download is injecting malicious content into Facebook and ultimately fooling users into downloading Android malware that can allow for the capturing of SMS messages.
Critical security issues that leave satellite communications vulnerable to being intercepted, manipulated or blocked were detailed in a white paper.
London-based CNS Hut3 warns that flaws in many Heartbleed detection tools could give companies a "false sense of security."
About 18 percent of online adults have had personal information stolen, and more than 20 percent had an email or social networking account compromised.
This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.
The permissions issue could allow a malicious app to alter legitimate home screen icons.
An incident response firm found that 93 percent of phishing emails were sent out on weekdays, with the most popular day being Wednesday.
Orbit Open Ad Server was vulnerable to SQL injection attacks, which could result in website visitors' information being stolen via malvertising, a security firm found.
An HHS report, based on audits between 2010 and 2012, noted serious vulnerabilities affecting 10 state Medicaid agencies.
Website security company Incapsula defended a client from a DDoS attack that was carried out using a persistent XSS vulnerability in a highly popular site that hosts video content.
The social media giant received close to 15,000 submissions, 687 of which were valid.
Added security and no longer having to memorize increasingly difficult passwords are some of the benefits resident members of Singapore's NTUC will get by activating their new OneKey two-factor authentication devices.
More than 24 million home routers have open DNS proxies that enable DNS-based DDoS attacks, and 5.3 million of the devices were used to generate attack traffic in February, according to Nominum.
Coinbase responded to a researcher's claims that the San Francisco-based Bitcoin exchange is vulnerable to information disclosure, user enumeration, and lack of rate limitation for sending money requests.
A researcher at Black Hat Asia highlighted security issues affecting Tesla Model S cars.
Researchers have discovered a new attack, known as Cross-Device Scripting, that can allow an attacker to compromise most smartphones by injecting malicious code through HTML5-based apps.
The security engineers presented the findings at the Black Hat conference in Singapore.
Researchers at RSA noted the "battle of the botmasters" taking place.
In a paper released on Wednesday, Swiss researchers suggest the transaction malleability Bitcoin flaw did not ruin Mt. Gox, despite what the Tokyo-based company announced.
At least two apps have been discovered on the official Google Play store that mine for cryptocurrencies, but overheating mobile devices and decreased performance may tip off Android users.
A WinRAR vulnerability is being taken advantage of in a malware campaign targeting government and international organizations, as well as Fortune Global 500 companies.
Cribit ransomware demands Bitcoin payment to decrypt hostage files, Trend Micro reveals.
The Gameover variant of the Zeus trojan is targeting employment sites Monster and CareerBuilder, according to F-Secure researchers.
A report investigates how static, or hard to change personal data, like SSNs or dates of birth, are impacted by repeated breaches.
PhishLabs researchers have identified a man-in-the-middle attack campaign that involves hackers posing as major organizations, including banks.
Under the right conditions, simply updating any Android device can enable an attacker to escalate app privileges and carry out all sorts of malicious things.
Researchers at FireEye say firms were targeted with phishing emails mentioning the mysterious flight.
An IntelCrawler report shines some new light on the Syrian Electronic Army, including its attacks, tactics, members and more.
Infected users are forced to contend with open windows, which are actually legitimate sites being displayed on their desktops.