Oracle risks to lose all current and future contracts with the US government after the US Department of Labor (DoL) has filed a lawsuit against the company's US Division, Oracle America., Inc..
Today, Oracle released their January 2017 Critical Patch Update, or CPU, that resolves a massive 270 vulnerabilities across all of their products. Of these 270 vulnerabilities, over 100 are remotely exploitable without authentication.
Today Apple released the GarageBand 10.1.5.1 and Logic Pro X 10.3 updates to fix a critical vulnerability in both program that could lead to remote code execution.
For the past week, unknown groups of cyber-criminals have taken control of and wiped data from CouchDB and Hadoop databases, in some cases asking for a ransom fee to return the stolen files, but in some cases, destroying data just for fun.
The Mozilla Foundation has launched a new logo and visual identity today to replace the old red dinosaur head that previously stood as its official logo.
Today we have a deal for an online course bundle that provides over 130 hours of content covering a wide array of programming languages for everything from web design and app development to database creation and app distribution.
Attackers with access to a device can take control over a target's computer and bypass all local security systems by abusing a hardware debugging interface included with Intel CPUs, which in recent years has become accessible via an external USB 3.0 port.
Google Chrome users need to be on the lookout for websites trying to trick them into downloading a font update package for their browser, as most chances are that the file is laced with malware.
A ransomware group has infected the computers of an Indiana-based cancer agency and have asked for a large payment of 50 Bitcoin ($44,800). The victim is Cancer Services of East Central Indiana-Little Red Door, an organization that helps "reduce the financial and emotional burdens of those dealing with a cancer diagnosis."
Recent versions of the Carbanak malware are now abusing several Google services to host command-and-control (C&C) infrastructure, which they use to manage infections and exfiltrate stolen data.
For more than four weeks, the only source of Locky ransomware infections has been through spam campaigns that distributed the Kovter click-fraud malware, as the primary source of Locky infections, the Necurs botnet, has been offline for the Christmas and New Year holidays.
Security researcher MalwareHunterTeam discovered today a new malware family that can infect computers and allow crooks to take control of these PCs using commands sent via an IRC channel.
Security researcher Tijme Gommers has discovered and publicly disclosed an issue in the McDonald's official website that allows an attacker to gain access to a user's password in cleartext.
A Dutch developer illegally accessed the accounts of over 20,000 users after he collected their login information via backdoors installed on websites he built. According to an official statement, Dutch police officials are now in the process of notifying these victims about the crook's actions.
The team at Keeper, a password manager application, has compiled a list of 2016's most commonly used passwords, and yet again people have chosen the simplistic "123456" as their favorite password in 2016.
Mobile security experts with Intel Security (McAfee) have discovered a rash of Android apps available through the Google Play Store that were stealing Instagram credentials and uploading the data to a remote server.
1,101,252 people signed a petition that asks President Barack Obama to pardon and exonerate NSA whistleblower Edward Snowden of all charges. The petition was set in motion in September 2016, just before the premiere of the Snowden movie, directed by Oliver Stone, and starring Joseph Gordon-Levitt as Snowden.