The flaw can be exploited to conduct denial-of-service attacks or remote hijacking.
Showing results 1 to 20 of 474
The new attack can be used to spy upon encrypted connections used by tens of thousands of HTTPS websites and mail servers.
One researcher says the critical flaw is caused by a simple example.html file enclosed by default in plugin packages.
Recently discovered vulnerabilities are being used by the Russian APT28 group to spy on government targets and steal politically sensitive data.
A vulnerability in the Android PackageInstaller system allowed attackers to hijack the installation process of a seemingly safe third-party Android app and replace it with one infected with malware.
In this month's Patch Tuesday, Microsoft is serving up a dozen security-related updates for Windows, including two fixes for vulnerabilities that have been publicly disclosed. In addition to five Critical security updates, today's list includes fixes for the cross-platform FREAK flaw.
Redmond has said that the FREAK security flaw is found in versions of its Windows operating system from Windows Server 2003, Windows Vista, and higher.
An HP report highlights how the bulk of exploits in 2014 revolved around vulnerabilities that were discovered before 2013.
BMW has released a patch for a flaw affecting 2.2 million vehicles, which could allow hackers to remotely unlock doors.
Adobe patches nine vulnerabilities -- four of which are considered "critical" -- in order to protect against hackers who could exploit the bug to take control of an affected system.
Researchers are warning genuine apps can be easily replaced with fake apps, which can be used to vacuum up a smartphone user's entire store of data.
New attack for Bash flaw sees hackers spreading a remote access control tool to spy on target systems.
A flaw in Adobe Acrobat and Reader for Windows is being exploited in the wild. Critical vulnerabilities affect all versions of Flash Player.
The Wall Street Journal is a fresh target in what appears to be a renewed assult against media publications online.
Attackers have an easy way to intercept and steal encrypted communications of Google's Gmail users on iOS.
iPhone users are vulnerable to a lock-screen flaw that allows a hands-on hacker to gain full access to a user's contacts list.
With the end of Windows XP support looming, ATMs worldwide are left vulnerable -- and cyberattackers are taking advantage of the fact.
A new iOS flaw has been discovered which could allow hackers to record every keystroke made on an Apple device -- jailbroken or not.
Instead of closing one of the top 10 most common web vulnerabilities on its site, Yahoo has said that an open direct flaw is 'working as designed'.
Apple's iMessage is believed to be among the most secure, surveillance-proof messaging tools. But hackers have exposed a flaw that allows malicious interception, impersonation, and the viewing of private messages.
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks