Cyber attackers and defenders are caught in a permanent to-and-fro dance, coming up with new solutions that break the last one created by their adversaries.
From this month on, all versions of Ask.com's infamous browser toolbar except the very last will be detected as unwanted software by Microsoft security products and removed.
Bas Venis has been programming since he was 14 years old.
Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? Saumil Shah, founder and CEO of Net-Square, has demonstrated at Hack in the Box Amsterdam 2015 that it's possible, and has posited that such attacks are more than likely to crop up in the near future, as he can't be the only one who thought about this, tried it and succeeded.
Hacker David Leo has released a PoC exploit for a Safari vulnerability that can be misused to trick users into thinking they are on one site while they are actually on another - a boon for phishers.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.