A number of D-Link storage devices have dozens of security vulnerabilities that can allow attackers to execute arbitrary code remotely and take full control of the devices, according to researchers at SEARCH-LAB.
Organized crime has become the most frequently seen actor in Web application attacks, with financial gain being the primary motive, according to the most recent Verizon DBIR report. To combat this growing threat to Web applications, security data and analytics firm Rapid7, best known for its Metasploit penetration testing tool, has acquired NT OBJECTives, a Web application security testing firm.
When a group finds WordPress vulnerabilities, they can exploit them worldwide. That is exactly what sympathizers with the terrorist group ISIS are doing, according to a warning issued Tuesday by the Federal Bureau of Investigation.
Mozilla has fixed more than a dozen vulnerabilities with the latest version of its Firefox browser, including a number of critical security flaws. In addition, Mozilla has added to the Firefox 37 browser "opportunistic encryption," which encrypts possibly sensitive data before sending it in the clear.
On Wednesday, Cisco released its semiannual security advisory for IOS software and IOS XE software, plugging 16 security holes that could result in "denial of service condition or interface wedge."
Apple has plugged 17 security vulnerabilities in the Safari browser's WebKit engine, which renders Web pages in the browser.
Security vulnerabilities at third-party vendors have been behind a number of high-profile data breaches, including major breaches at Target, AT&T, Lowe's, AutoNation and the Department of Defense's TRICARE healthcare network.
As Apple prepares to launch two iPhone 6 versions and a rumored iWatch, some are questioning whether Cupertino's reputation for iron-clad security is deserved.
Data breaches in the first half of this year exposed 502 million records, far exceeding the number of records exposed in the first half of 2013, the previous half-year record, according to the last data from security intelligence firm Risk Based Security.
Mobile security is a hot topic at the Black Hat security conference being held this week in Las Vegas. I am here at Black Hat and will be sharing mobile security insights with you in the coming days.