Security News

Researchers have demonstrated how the PC-based Rowhammer attack also works against Android devices.

A privilege escalation vulnerability, nicknamed Dirty Cow and present in Linux since 2007, has been used in public attacks against web-facing Linux servers.


Security experts are reporting popular adult website Adult FriendFinder has been compromised by hackers who have gained access to the site's backend servers.





Akamai warns that attackers are compromising IOT devices and using them as proxies to test stolen credentials against web-based applications.

Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data compromise, we will keep...