Representatives of Cosmos Bank, India's second-largest cooperative bank, revealed this week that hackers breached the bank's servers over the weekend and stole over 940 million rupees ($13.5 million) across three days.
Google has patched a vulnerability in the Chrome browser that allows an attacker to retrieve sensitive information from other sites via audio or video HTML tags.
A popular Firefox add-on is secretly logging users' browsing history, according to reports from the author of the uBlock Origin ad blocker and Mike Kuketz, a German privacy and security blogger.
On Monday, a Florida judge sentenced a former Microsoft network engineer to 18 months in prison for his role in helping launder money obtained from victims of the Reveton ransomware.
A new attack named VORACLE can recover HTTP traffic sent via encrypted VPN connections under certain conditions.
Microsoft's monthly Patch Tuesday security updates are out, and for August 2018, the Redmond-based OS maker has fixed 60 security flaws, including two zero-days under active attacks.
Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs.
A few minutes ago, Adobe published its monthly Patch Tuesday updates train for the month of August 2018. This month, Adobe's security team patched vulnerabilities in products such as Flash Player (multimedia player), Experience Manager (enterprise CMS), Acrobat and Reader (PDF readers/editors), and the Creative Cloud Desktop App.
Hackers can falsify patients' vitals by emulating data sent from medical equipment clients to central monitoring systems, a McAfee security researcher revealed over the weekend at the DEF CON 26 security conference.
As Bleeping Computer first reported back in January this year, Google has started rolling out support for built-in lazy loading inside Chrome.
Cisco, one of the world's largest vendor of networking equipment, released security updates today to patch a vulnerability in the IOS and IOS XE operating systems that run the vast majority of its devices.
Two recently discovered vulnerabilities in the fax protocol can transform fax machines into entry points for hackers into corporate networks, two Check Point researchers revealed last week in a talk given at the DEF CON 26 security conference held in Las Vegas.
Some of the most popular Android applications installed on your phone may be vulnerable to a new type of attack named "Man-in-the-Disk" that can grant a third-party app the ability to crash them and/or run malicious code.
At the DEF CON 26 security conference held in Las Vegas last week, a security researcher detailed a backdoor mechanism in x86-based VIA C3 processors, a CPU family produced and sold between 2001 and 2003 by Taiwan-based VIA Technologies Inc.
Last week, at the DEF CON security conference held in Las Vegas, security researchers presented details about 47 vulnerabilities in the firmware and default apps of 25 Android smartphone models, 11 of which are also sold in the US.