A security researcher found a remote code execution exploit that can potentially take over a range of devices with Broadcom Wi-Fi chips. The exploit is rooted in a vulnerability with the chip's firmware, similar to the Broadpwn exploit.
Major events shook the global threat landscape in the first half of 2017. Our midyear security roundup covers the old and the new, from ransomware and BEC scams to potential attacks against industrial robots. Read more
The 2016 threat landscape was riddled with threats that set new record highs: new ransomware families, BEC scams across the world, and vulnerabilities found in widely used platforms. Stay ahead of the current business threats with our latest security roundup. Read more
Ransomware has already raked in around US$209 million from enterprises alone in the first quarter of 2016. Unfortunately, it's just one of the many possible threat types that exploit kits can deliver to vulnerable systems. Read more
Ransomware and BEC scams lead the wave of threats that are turning 2016 into the Year of Online Extortion. Learn how these have changed the landscape and how organizations can protect themselves in our midyear security roundup. Read more
This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world. Read more
Oracle’s much-abused Java browser plugin is finally en route to its final resting place. According to Oracle, the plugin will be deprecated in the next release of Java version 9—which is currently available in an early beta stage. Read more