The internet is literally crawling with bots. Millions of them scour the farthest reaches of the internet every day, indexing content, testing connections, and making the web more useful overall.
After 20 million of its dating site users' email addresses were put up for sale online, Topface tracked down the hacker behind the amassed database and paid him "an award for finding a vulnerability.
The number of infections for a malvertising campaign originating on an adult website rose by 1500 percent in a two-day period.
The source code sharing website will up its maximum payout from $5,000 to $10,000 in its bug bounty program's second year.
While the cloud has fundamentally changed the way we do business, it has left organizations feeling vulnerable to attacks. Enterprise security architectures are being extended to include data security for the cloud.
Qualys has identified a buffer overflow vulnerability in the Linux GNU C Library that, if exploited, could enable an attacker to remotely take complete control of a victim's system.
A security engineer from Citrix demonstrated the Maldrone malware that he built as a backdoor to control drones.
The hotel chain has addressed a weakness in its Marriott International Android app that could have allowed attackers to access customer data, including credit card information.
The use-after-free vulnerability was being exploited in drive-by-download attacks, Adobe warned.
The Yosemite 10.10.2 release will address the vulnerability that can be exploited via a Mac's Thunderbolt port, in addition to three recently disclosed Project Zero vulnerabilities.
The head weapons tester at the Pentagon has released a report that indicates a slew of vulnerabilities affecting Department of Defense networks.
More than 5,000 ATGs nationwide are vulnerable to attack through exposed serial port interfaces.
Adobe said it is aware of reports that an exploit for the bug exists.
The dongle that is used by Progressive Insurance and is deemed insecure is used in more than two million vehicles in the U.S.
Verizon has fixed a critical vulnerability in its My FiOS app that made it possible to read and send messages from any Verizon user's email account.
After discovering the bug, security researcher Dylan Saccomanni reached out to the domain registrar, which updated its CSRF protection on Monday.
The mission of the working group will be to enhance health information technology (HIT) security.
Numerous Firefox vulnerabilities, some deemed critical, have been addressed by Mozilla in the latest release of its web browser.
The KeySweeper device leverages a vulnerability in Microsoft wireless keyboards and can sniff, decrypt and log all keystrokes.
Google has killed security updates for WebKit in earlier Android versions, leaving nearly a billion users at risk.
Adobe Flash Player and AIR users are urged to update to the latest versions of the software after a total of nine flaws have been patched.
Moonpig, a customizable greeting card company, had 3 million customers' personal information exposed after a developer detailed a security vulnerability online.
Google's "Project Zero" team discovered an elevation of privilege flaw in Windows 8.1 and detailed the vulnerability online, 90 days after alerting Microsoft.
Apple apparently has patched a vulnerability that could be easily exploited by the iDict hacking tool released on New Year's Day.
A server not upgraded with two-factor authentication is the likely way hackers got into JPMorgan's system, the New York Times reported.
Vulnerabilities in Signaling System 7 make it possible for anyone to listen in on phone calls and read text messages, even if encrypted.
An advisory is warning all users of GitHub for Windows and GitHub for Mac to update their clients as soon as possible.
Palo Alto Networks Unit 42 researchers have identified the backdoor on numerous devices, so far leaving more than 10 million users vulnerable.
The vulnerability can enable attackers to steal credentials and personal and business data, as well as infect machines with malware.
The rigidity of web application security controls has left the enterprise vulnerable to data breach.
Sign up to our newsletters
SC Magazine Articles
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Zeus variant targeting Canadian banks, U.S. banks may also be a target
- New attack uses ransomware to drop trojans and keyloggers
- 'GHOST' bug in Linux library enables remote takeover of victim's system
- Firm finds link between Regin spy tool and QWERTY keylogger
- Report: From Q3 to Q4, 90 percent increase in global DDoS attacks observed
- Researchers observe databases being encrypted, websites held for ransom
- ZeroAccess botnet reactivates, click fraud activity resumes
- BCBS of Tennessee shares personal data on 80K in marketing campaign
- Tips for organizations in the wake of the biggest corporate hack in history