Image-processing tool ImageMagick has been found to have a bug that could expose websites to attacks, affecting sites that use the tool and those that allow image uploads.
A new post on an underground cybercrime forum confirmed the theft and intent to sell stolen data of 1.5 million customers of Verizon Enterprise Solutions.
2015 laid the groundwork for what we can now consider the new status quo in cybersecurity. Will current security strategies hold against this existing paradigm or will organizations need to consider a change?
A new HTTPS vulnerability, dubbed DROWN, has been discovered, reportedly affecting approximately 33% of all HTTPS-using domains that include websites, mail servers and TLS-dependent services.
Security researchers discovered that the Nissan’s car mobile app can be used to remotely hack any Nissan Leaf car’s features from halfway around the world.
Another smart toy vulnerability? Boston-based researchers found a flaw in a Fisher-Price smart toy that exposes sensitive user data, including a child’s name, birthdate, and gender.
A San Diego-based researcher discovered a flaw in a smart car’s operating system that allows it to be carjacked by playing a spiked .WMA track on its CD player.
Oracle’s much-abused Java browser plugin is finally en route to its final resting place. According to Oracle, the plugin will be deprecated in the next release of Java version 9—which is currently available in an early beta stage.