Recently discovered vulnerabilities are being used by the Russian APT28 group to spy on government targets and steal politically sensitive data.
Showing results 1 to 20 of 1,055
Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to Secunia, while IBM software took 40 percent of the Top 20 places.
A vulnerability in the Android PackageInstaller system allowed attackers to hijack the installation process of a seemingly safe third-party Android app and replace it with one infected with malware.
In this month's Patch Tuesday, Microsoft is serving up a dozen security-related updates for Windows, including two fixes for vulnerabilities that have been publicly disclosed. In addition to five Critical security updates, today's list includes fixes for the cross-platform FREAK flaw.
Redmond has said that the FREAK security flaw is found in versions of its Windows operating system from Windows Server 2003, Windows Vista, and higher.
Internet of Things devices are not originally built to be robust against attacks, resulting in vulnerabilities that can lead to severe repercussions if left unchecked, such as data that's being collected and acted upon in Singapore's smart nation plan.
The Internet of Things opens up a world of possibilities for our connected lives. But what if a hacker could gain control of the things that mean the most to us. Here we investigate some possible hacking scenarios that could just happen.
An HP report highlights how the bulk of exploits in 2014 revolved around vulnerabilities that were discovered before 2013.
Microsoft engineers are working to fix a dangerous flaw found in Internet Explorer which allows attackers to steal user credentials.
BMW has released a patch for a flaw affecting 2.2 million vehicles, which could allow hackers to remotely unlock doors.
The increase of distributed denial-of-service attacks during Q4 2014 was driven by the rise of the Internet of Things, and the increasing exploitation of web vulnerabilities and botnet building.
Adobe patches nine vulnerabilities -- four of which are considered "critical" -- in order to protect against hackers who could exploit the bug to take control of an affected system.
UPDATED. I ran the numbers and vulnerabilities in browsers are up this year, as is their severity. We know more about this for Internet Explorer because Microsoft provides the most data.
Researchers are warning genuine apps can be easily replaced with fake apps, which can be used to vacuum up a smartphone user's entire store of data.
New attack for Bash flaw sees hackers spreading a remote access control tool to spy on target systems.
A Cumulative Update for Internet Explorer fixes 37 vulnerabilities, one of which is old and publicly-disclosed, although not especially severe.
Updates released today address a total of 37 vulnerabilities in Windows, Internet Explorer, Office, SharePoint Server 2013, the .NET Framework and SQL Server.
A flaw in Adobe Acrobat and Reader for Windows is being exploited in the wild. Critical vulnerabilities affect all versions of Flash Player.
The Wall Street Journal is a fresh target in what appears to be a renewed assult against media publications online.
Attackers have an easy way to intercept and steal encrypted communications of Google's Gmail users on iOS.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 34 ways to improve your iPhone's battery life
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 So you have an app idea and want to make a bajillion bucks
- 5 ZDNet Cloud TV: Impact of cloud on HR (highlights)