WordPress is the most-used content management system (CMS) in the world. More than 60 million websites, or 22.9% of the internet, use WordPress for content creation.
Due to the flaw, iPhone bidders were vulnerable to being redirected to a phishing page.
The Reader and Acrobat fixes were delayed a week due to issues found during testing.
Google reportedly addressed the issue, but many users likely await the fix from providers or OEMs.
A security expert discovered a vulnerability in Amazon's Kindle Library that could lead to cross-site scripting attacks and account compromises.
Often, the best way to make sure something works is to try it out. When it comes to network security, trying it out before an attacker does is an excellent idea.
Microsoft introduced a security feature in versions of Internet Explorer that blocks out-of-date ActiveX controls.
One bulletin is deemed critical and addresses 37 vulnerabilities in Internet Explorer that enable remote code execution.
Adobe has issued security fixes addressing 12 vulnerabilities affecting its Flash Player and AIR for Windows, Macintosh and Linux platforms.
Sensys Networks addressed two vulnerabilities in its vehicle traffic sensors that were discovered by Cesar Cerrudo, CTO of IOActive Labs.
On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector
On Monday, the University of New Haven revealed its first video in a series of security findings.
Customers of New Zealand communications service provider Spark experienced internet connectivity issues over the weekend due to a distributed denial-of-service attack.
The sole critical patch this month will address remote code execution issues in Internet Explorer.
High-Tech Bridge discovered two SQL injection vulnerabilities in All In One WordPress Security and Firewall plugin and notified the vendor.
The social media giant recently announced its new bug bounty program, rewarding researchers that find security vulnerabilities in its web services.
Employees are an organization's greatest asset and greatest risk. With a single click an employee can devastate a business by transferring or damaging huge amounts of data.
The third annual Mobile Pwn2Own competition will feature new devices to crack and a $425,000 prize pool, which has gone up $125,000 from last year's.
Mozilla enabled public key pinning support in Firefox 32 primarily as a way to defend against man-in-the-middle attacks.
Trend Micro first alerted the public to the backdoor affecting Netis and Netcore brand routers.
Reports surfaced that iCloud vulnerabilities may have allowed hackers to obtain personal photos, including nude images, of over 100 celebrities.
An audit of the Joint Polar Satellite System ground system revealed thousands of vulnerabilities, most of which will be addressed in two years when the next version of the system is released.
The number of disclosed vulnerabilities is on track to fall below 8,000 this year, a first since 2011.
The routers are sold in China under the Netcore brand name, and elsewhere as Netis products.
Anonymous confessions posted on a popular app, called "Secret," were susceptible to being exposed via a hack.
The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.
In his own home, a researcher was able to hack various network connected devices that are not computers and mobile phones.
Sources close to the breach investigation tipped off TrustedSec CEO David Kennedy.
The vulnerability comes into play when Instagram users search for Facebook friends to "follow."
HTTP Shaming was created by a security consultant to call out apps and web services that put user information at risk.