Please turn on your JavaScript for this page to function normally.
Top 10 business logic attack vectors

Application business logic flaws are unique to each custom application, potentially very damaging, and difficult to test. Attackers exploit business logic by using deductive …

RedKit exploit kit spotted in the wild

A new exploit kit that Trustwave researchers have spotted being used in the wild is aiming to enter a market that is practically monopolized by the widely famous BlackHole and …

Samsung TVs vulnerable to endless restarts due to bug

Luigi Auriemma, the prolific Italian researcher and tester that continuously discovers new vulnerabilities in a great number of devices, platforms, games, browsers, SCADA …

Mobile vulnerabilities increased by 93%

A new Symantec report shows that while the number of vulnerabilities decreased by 20 percent, the number of malicious attacks continued to skyrocket by 81 percent. In …

Majority of web apps vulnerable to most frequent exploits

84 percent of web applications from public companies were deemed unacceptable when measured against the OWASP Top 10 most frequently exploited web application vulnerabilities, …

Google raises bug bounty to $20,000

Google has announced that it will be updating the rules for its bug bounty program and will start handing out bigger amounts to the researchers participating in it. According …

Oracle fixes 88 security vulnerabilities

Oracle’s Critical Patch Update for April 2012 fixes 88 security vulnerabilities across the product line. The amount of fixes isn’t really a big concern; it’s …

New Mac malware uses Flashback Java exploit

Apple’s decision to push out a Flashback malware removal tool for OS X Lion bundled with a new Java security update has proven to be rather fortunate, as a new Mac OS X …

Mobile devices expose company data to vulnerabilities

Mobilisafe announced results of its SMB focused study. As part of a private beta program, participants evaluated a product that assesses the security risk of mobile devices …

Apple patches critical Java flaw

Apple released a critical update for the Java implementation on Mac OS X, for both Lion and Snow Leopard. This update comes almost two months after the release of the …

Mac Trojan infects machines via unpatched Java bug

Flashback Trojan variants have been targeting Mac users since September 2011, and they have gone through a variety of changes and techniques aimed at achieving its …

Top concern? Mobile device vulnerability management

Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security. According to the study, …

Don't miss

Cybersecurity news