A major vulnerability was discovered in several popular Netgear routers that could leave thousands of home networking devices exposed to arbitrary command injection.
The most notable cybersecurity incidents of the past year, from the biggest data breaches and most expensive attacks to the most persistent attackers and impactful malware.
Ransomware has already raked in around US$209 million from enterprises alone in the first quarter of 2016. Unfortunately, it's just one of the many possible threat types that exploit kits can deliver to vulnerable systems.
Ransomware and BEC scams lead the wave of threats that are turning 2016 into the Year of Online Extortion. Learn how these have changed the landscape and how organizations can protect themselves in our midyear security roundup.
Security researchers have been exposing smart car vulnerabilities for years, showing how susceptible they are to hackers. The automotive industry has since implemented robust cybersecurity practices while governments take steps to enact new legislation.
The latest hacks on Ubuntu, Clash of Kings, Warframe, and most recently, Disney’s Playdom have two things in common—all are running vBulletin. Learn more.
This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world.
Pwn2Own is all about owning systems/devices—a test of technical skill to see who the best hacker is. It also demonstrated how browsers and plug-ins can be used as effective attack vectors.