Twitter has just reported that earlier this week, it was a victim of a successful compromise of its systems, resulting in the "limited access" to user information, including usernames, email addresses, session tokens, and encrypted/salted passwords.
Latest from Dancho Danchev
Security researchers from Trusteer have detected several malvertising campaigns, affecting multiple ad networks, which attempt to serve client-side exploits, ultimately dropping malware through the Black Hole Exploit Kit.
Earlier this month, BahrainWatch.org was contacted by an UAE activist, who reported receiving a suspicious email. Upon deeper examination, it was revealed that it was a targeted attack relying on a Java exploit, which would have dropped a Remote Access Trojan (RAT), if the attack wasn't detected.
Yesterday's release of WordPress v3.5.1, fixes 37 bugs, including three security issues.
According to the most recently released comparative review by av-comparatives.org, Opera leads competing browsers in anti-phishing protection. Should you make the switch? Not so fast!
Despite Microsoft's response to the rise of AutoRun malware infections in February, 2011, according to ESET's recently released telemetry data for 2012, the infection vector tops their chart for a second year in a row.
Which mobile application do you use to check the scores of your favorite games? If that's ESPN's ScoreCenter for iOS, then you have a problem, and it's called a "false feeling of security".
Dutch security researchers from Fox-IT have released a paper detailing the inner workings of the Pobelka botnet, including details on its botnet master.
Kaspersky Lab's recently released "Global Web Browser Usage and Security Trends" report sparks several important questions from a security perspective.