The "Kitten of Doom" denial-of-service attack is easy to carry out.
The issue comes from how Gmail automatically files messages into the "Sent" folder.
The privilege-escalation vulnerability would allow an attacker to inject malware, place ads and load custom code on an impacted website.
The flaw in a high-end phones and up-and-coming handsets made by top OEMs allows hackers to bypass handset lock screens in seconds.
The modular malware seems to be in a testing phase, but TA505's interest made researchers take note.
Why manufacturing and logistics are especially challenged.
"Our advice is to stop using this watch" as mitigations are not available, researchers told Threatpost.
As consumers skip the store crowds in favor of online deals, cyberattackers have geared up to victimize them.
A slew of verified Twitter accounts have been hijacked and altered, used to tweet out a bogus Bitcoin giveaway scam.
Hacker contest earns participants $325,000 based on the discovery of 18 vulnerabilities.
The industrial company on Tuesday released mitigations for eight vulnerabilities overall.
Microsoft’s November Patch Tuesday fixes include mitigation against a zero-day vulnerability leaving Windows 7, Server 2008 and Server 2008 R2 open to attack.
Google cloud business customers were impacted by a Border Gateway Protocol hijacking.
The vulnerability is one of many with the same root cause: Cross-process information leakage.
Overall, the company released only three patches as part of its regularly-scheduled November update.
An attorney in the infamous 2015 Jeep hack predicts that more lawsuits related to IoT security are looming in the future.
The new variant can exfiltrate emails for a period going back 180 days, en masse.
A full 60 million U.S. cards were compromised in the past 12 months. While 93 percent of those were EMV chip-enabled, merchants continued to use mag stripes.
Google Play’s policy prohibits apps or SDKs that download executable code, such as dex files or native code, from a source other than Google Play
Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn.