A blog from Oracle announced the eventual end-of-life of their Java browser plugin in the Java Development Kit (JDK) 9, as a response to many browser vendors that are now moving away from supporting plugins.
An Austrian consulting firm, SEC Consult, found a backdoor in a central controller system product designed by Texas-based manufacturer AMX (part of Harman International).
Oracle recently issued 248 patches in total, affecting over 50 different product lines. About 71 percent of the latest vulnerabilities allow an attacker to exploit them remotely without authentication, according to an analysis from ERPScan.com.
Downloading unsigned and unverified applications onto your mobile, laptop and other devices can expose users to potentially malicious code that can steal your private information, like your SSN or bank account information.
Recently, the Duo Labs team analyzed the current state of security of Android devices. Our large sample includes users' personal devices used to access their employers systems and data, authenticating with Duo's two-factor authentication.
X-Ray is an app anyone can download that safely scans for vulnerabilities on your Android phone or tablet, allowing you to assess your current mobile security risk.
In what appears to be an act of hacktivism in support of the Palestinian cause, a group of hackers continues to target U.S. federal officials. The latest victim is the U.S. Director of National Intelligence, James Clapper, as reported by Motherboard.
Flash Vulnerabilities & Exploits: An Information Security Primer Industry News / Featured Article
Adobe Flash Player is used to create and play animations, video games, advertisements and mobile apps - it’s considered a software necessity by many users and is used daily. But to criminal and malicious hackers, it’s also easy to exploit, due to many known vulnerabilities in old Flash versions.
Today, we’re announcing Duo Security’s official switch to duo.com (previously duosecurity.com)! We often refer to ourselves as Duo internally, and our customers do too - now our website reflects that sentiment.
One of the latest and most critical Android vulnerabilities can give an attacker privileges to a user’s device simply by tricking them into opening media files in a browser, according to the latest Nexus Security Bulletin.
Identity theft and account takeover is common for bank accounts and medical insurance, but what about online gaming? Gaming accounts are often targeted for the value of items that can be traded in games (known as in-game commerce), as well sold for player value.