Microsoft and Adobe are warning users against two zero-day vulnerabilities that are being used in the wild. Microsoft already patched its software with yesterday's Patch Tuesday.
"Valiant Hearts" for Windows 10
Catch up on what's new in the Windows Store
windows store weekly
Microsoft's future phones to target businesses in just 18 'core markets'
...of fabulous flagships, Xbox excitement and Microsoft's mobile meltdown
Your handy guide to all the phones + tablets running Windows 10 Mobile
windows 10 mobile
The Lenovo Solution Centre, pre-bundled on almost every Lenovo PC, has been found to have a flaw that could put affected PCs at risk of attack, by allowing elevated privileges on the machine.
WIGI is a vulnerability scanner that searches for outdated plugins and offers to download/install them from official sources.
Thought you'd seen it all? This team of enterprising hackers who not only spread ransomware but also run a 'referral' program encouraging victims to further spread the malware might surprise you.
According to at least one hacker and security expert, Microsoft's mobile OS gets top points for security. He claims that Windows Phone is the most secure mobile OS, beating both iOS and Android.
After announcing an iOS 9 exploit bounty earlier this year, security firm Zerodium has announced that one team was able to create an exploit that was eligible for the full million dollar payout.
After the Xcode blunder that happened over a month ago at Apple's App Store, hundreds of apps have recently been deleted from the store, due to their ability to record private data.
Security researchers plan to present findings on an easily-performed exploit of OS X's Gatekeeper software at the Virus Bulletin Conference in Prague, Czech Republic on Thursday.
New security firm Zerodium is offering a million dollar payout for anyone who can provide a jailbreak for iOS 9. The initiative has been dubbed ‘The Million Dollar iOS 9 Bug Bounty'.
iOS users beware! A new kind of malware called KeyRaider that targets only jailbroken devices is out in the wild and has already claimed over 250,000 Apple accounts.
Another security breach was found in Lenovo's computers. The company was found automatically reinstalling its own software even when a computer had been wiped clean on an installation of Windows.
Researchers have outlined a vulnerability in the way permissions for support apps are installed by most OEMs on their Android devices which can allow for total control of a device.
A malicious exploit hidden in an advertisement on a Russian site allowed access to Firefox users' files and could upload data to an external server; users are advised to upgrade to new version.
The vulnerability lets an attacker take control of any device running Android 2.2 onwards using multimedia content - but while Google has had a patch since April, 95% of devices remain unprotected.
Internet Explorer has often struggled with bugs and HP has just revealed four more, affecting only the mobile version of Internet Explorer and allowing remote execution of code on a device.
A new version of the famous ransomware Cryptolocker named TeslaCrypt has been released, and is out to target gamers. It holds game files hostage unless a payment in bitcoins is made.
Attackers can now bypass the same-origin policy in Internet Explorer with a newly discovered vulnerability that allows them to inject malicious code into any website and steal cookies.
Google has taken new steps to improving the privacy of its email client, Gmail. A new security concept has been used on the client that prevents possible malicious add-ons from snooping on your email.
Hundreds of thousands of WordPress websites have been infected by malware coming from a premium plugin. This then turns these websites into a malware distribution system, upon every visit.
According to a report from a cybersecurity company, Russian hackers have been using a Windows exploit found in almost all versions of the OS to spy on important institutions and governments.
Symantec has found that a seemingly organized group of hackers, nicknamed Dragonfly, has been infiltrating energy providers by using trojans and phishing techniques. The group has yet to be caught.
Multiple Mediatek-based smartphones, including the Acer Liquid E2, are automatically restarting themselves upon receiving a plain equals sign ("=") in an SMS message. However the fix is fairly simple.
WordPress users could be left vulnerable over unsecured networks due to unencrypted cookies when logging in to the website, which means possible exposure of private emails, user settings, and more.
Two separate estimates show that around half of the servers previously affected by HeartBleed are still susceptible. The estimates show around 318,239, or 2.33% of all servers are still vulnerable.
CRA Commissioner Andrew Treusch stated that over a period of six hours, the Social Insurance Numbers of around 900 people were removed from CRA computer systems.
Significant flaw revealed in Apple iOS, and potentially also affecting Apple OSX Mavericks
A security firm has discovered a new zero-day exploit in Internet Explorer 10 and Adobe Flash that has been found on the U.S. Veterans of Foreign Wars' website and could be targeting the U.S. military
An exploit targeting the Find My Phone service on the latest iOS devices has been published. The security flaw allows for a hacker to prevent any access to the device remotely, preventing GPS tracking
Snapchat users can rest a bit easier today, as the company has finally updated its mobile apps. Folks can now opt out of the feature that was used in the exploit that exposed 4.6 million accounts.
Hackers posted up the usernames and phone numbers for 4.6 million Snapchat accounts on a website this week, thanks to exploiting a known security issue with the service that has yet to be fixed.
Microsoft has announced an expansion of its $100,000 Windows exploit bounty program to include submissions from responders and forensic experts who find these bugs in the wild.
A Google security engineer has posted evidence of a Windows zero-day exploit on a public website. Microsoft stated that it is investigating the claim but said there's no evidence it is being used.
The new Internet Explorer 8 zero-day exploit that was confirmed by Microsoft on Friday is being blamed as the cause of attacks that have created malware infections on a number of websites.
Microsoft has now released a "Fix It" patch for the exploit that was discovered last week in its Internet Explorer 6, 7 and 8 versions and is still working on a full update for those browsers.
Microsoft has finally responded to the claims that arose yesterday that said there was a flaw with Internet Explorer that would allow your mouse to be tracked.
A flaw that was discovered and disclosed to Microsoft in October has been revealed that allows anyone to track your mouse movements and Microsoft has refused to fix the issue.
Microsoft has finally patched an exploit that would turn an illegal copy of Windows 8 into a legal copy by downloading the free Windows Media Center add-on from Microsoft.
A security company called VUPEN claims to have found a zero day exploit in Windows 8 and Internet Explorer 10 and is selling that information to companies. Microsoft has no comment yet.
A new Sophos study claims that Microsoft's Bing search engine has twice as many 'poison links' as Google, with image searches in particular being plagued by Blackhole exploits and malware.
A security researcher has discovered another zero-day security exploit in Java, one that affects pretty much every Java version across every browser - putting around one billion computers at risk
Samsung has confirmed that a Galaxy S III updated to the latest software version is not vulnerable to the USSD TEL code remote wipe exploit. No word was given regarding other TouchWiz devices
An exploit has been video recorded which showcases ISOs for Metal Gear Solid: Peace Walker and Shining Blade loading and running on Sony's newest handheld console, the PlayStation Vita.
Google faces an investigation from the Federal Trade Commission over an exploit they manipulated with Safari's cookies, allowing them to track users who did not give permission to be tracked.
An Illinois woman has filed a lawsuit against LinkedIn after its password breach, citing the company's incorrect claims about its level of protection for users.
Both Microsoft and Google have sent out advisories warning users of an IE zero-day exploit that's being used to hijack Gmail accounts, with Google claiming these attacks are "state-sponsored"
A Windows hack allows a user with access to a computer to configure it to run applications on top of the login screen with administrator rights and is virtually undetectable.
Microsoft has confirmed that it has fixed an password reset exploit in Hotmail after the problem had apparently already been discovered by hackers earlier this month.
Chinese hackers have released the road map to creating an exploit code designed to go after a Windows remote desktop protocol flaw that Microsoft issued a patch for this week.
A web browser exploit that caused a flood of pornographic and violent images to be posted on the News Feeds of a number of Facebook users has now been stopped, according to the company.
A new vulnerability in OS X Lion has been discovered that allows you to bypass a password if authenticating using LDAP; Apple has reportedly confirmed the bugs existence.