Vulnerabilities & Exploits
- October 12, 2016Ransomware has already raked in around US$209 million from enterprises alone in the first quarter of 2016. Unfortunately, it's just one of the many possible threat types that exploit kits can deliver to vulnerable systems.
- August 23, 2016Ransomware and BEC scams lead the wave of threats that are turning 2016 into the Year of Online Extortion. Learn how these have changed the landscape and how organizations can protect themselves in our midyear security roundup.
- August 11, 2016Google's Chrome 53 will effectively begin to block Flash in September. How will this move affect the Web?
- August 10, 2016Security researchers have been exposing smart car vulnerabilities for years, showing how susceptible they are to hackers. The automotive industry has since implemented robust cybersecurity practices while governments take steps to enact new legislation.
- August 08, 2016The latest hacks on Ubuntu, Clash of Kings, Warframe, and most recently, Disney’s Playdom have two things in common—all are running vBulletin. Learn more.
- August 04, 2016This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world.
- August 03, 2016Pwn2Own is all about owning systems/devices—a test of technical skill to see who the best hacker is. It also demonstrated how browsers and plug-ins can be used as effective attack vectors.
- July 28, 2016Various business websites were recently hijacked to deliver crypto-ransomware to visitors. Why do attackers repeat the cycle of compromising legitimate websites via exploit kits, malware and vulnerable software?
- June 15, 2016Vetted hackers who participated in the Department of Defense’s ‘Hack the Pentagon’ bug bounty program uncovered over 100 security flaws in its public websites.