Based on an analysis of the Alexa top one million sites, Menlo Security found that more than one in three of the top domains are either already compromised or running vulnerable software.
In total, Menlo Security scanned more than 1.75 million URLs representing over 750,000 unique domains.
One of the weirder attacks to bridge air gap networks has emerged, and uses heat to transfer data between machines.
The command and control mechanism forged by Ben Gurion University researchers could transfer sensitive data through "thermal pings" between two physically close computers.
In the latest security lapse involving the Internet's widely used encryption system, Google said unauthorized digital certificates have been issued for several of its domains and warned misissued credentials may be impersonating other unnamed sites as well.
Next weekend, voters in the Australian State of New South Wales go to the polls to elect a new government. Some have already cast their votes online, with a system that may be running the FREAK bug.
So say Vanessa Teague and J. Alex Halderman, respectively a research fellow in the Department of Computing and Information Systems at at the University of Melbourne and an assistant professor of computer science and engineering at the University of Michigan and director of Michigan’s Center for Computer Security and Society.
CeBIT attendees on Thursday fell victims to a series of well-executed hacks. Thankfully, they weren’t malicious in origin; instead, they were live demonstrations by notorious ex-hacker Kevin Mitnick.
Though Mitnick’s hacking skills once earned him a spot on the FBI’s Most Wanted list, he is now a world-renowned security consultant. He and his team of specialists use various methods of intrusion to infiltrate clients - including major Fortune 500 companies – and boast a 100% success rate.