Hackers targeted Microsoft's Internet Explorer with an emerging attack technique called action script spray in the first half of 2014, say Bromium Labs researchers.
While Java was a huge target for hackers in 2013, the number of Java-related attacks has dropped dramatically this year. Somewhat surprisingly, no zero day Java exploits were reported in the first half … more »
While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.
Months after reporting its first vulnerabilities, Google officially acknowledges the existence of a shadowy security group known as Project Zero.
When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.
Use-after-free memory errors often crop up in software application code.
New IBM Trusteer research finds new variants of malware used to exploit Brazil's Boleto payment system.
Train users to read and heed mobile application permissions, says McAfee Labs.