Fraudsters have used the MS Office Equation Editor cybersecurity vulnerability to craft an attack on financial institutions and users.
The information and communication technology (ICT) industry suffered the second-most attacks out of all sectors monitored by IBM X-Force in 2016.
Cisco recently addressed two exploits that sound more like delicious drive-thru menu items than dangerous security risks: EXTRABACON and EPICBANANA.
A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them.
Security experts say unless users upgrade to the latest firmware, a type of Belkin router that has been on the market since 2011 may be open to attacks.
Android KeyStore Stack Buffer Overflow: To Keep Things Simple, Buffers Are Always Larger Than Needed
Nine months ago, IBM discovered a classic stack-based buffer overflow in the Android KeyStore service; the vulnerability was recently disclosed publicly.