Intel is introducing new ideas to secure the public cloud, offering a service in which online files can be accessed after users are verified by an authentication scheme including face and voice recognition. McAfee, a unit of Intel, is ...
Tags: Intel, McAfee, Cloud Storage
Corporate IT departments will be faced with a "mega patch" Tuesday from Microsoft today. The patches to Microsoft's various Windows operating systems and essential applications will patch a number of flaws that are already being exploited ...
Tags: Microsoft, Mega Patch
Microsoft has released a temporary fix for a zero-day vulnerability in Internet Explorer 8, which was used by hackers in a prominent attack against the U.S. Department of Labor's website. The problem is particularly dangerous since it can ...
Tags: Microsoft, Internet Explorer
Teaching engineers cyber security skills is vital in order to protect the UK's critical national infrastructure, according to cyber expert at the Institute of Engineering and Technology (IET), Hugh Boyes. The IET is trying to raise ...
Tags: Computer Products, software
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that ...
Tags: Web software, software, Computer Products
AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and ...
Several media outlets in the Washington DC area have had their websites hacked and used to spread malware. WTOP, the largest radio station in the region, and Federal News Radio, along with the website of technology blogger John Dvorak ...
Tags: Media Websites, Cyber Attacks
A Pentagon report has accused the Chinese government of cyber attacks against military and civilian computer systems in the US. It marks the first time US authorities have directly suggested that Beijing is behind computer hacking, with ...
Tags: Pentagon, Computer Systems
For a few months earlier this year, the personal data of customers of the Schnucks supermarket chain was exposed to hackers whose work went undetected until after a card processing company issued an alert about fraudulent activity on a ...
Tags: Hackers, Computer Products
Microsoft late Friday confirmed that a "zero-day," or unpatched, vulnerability exists in Internet Explorer 8 (IE8), the company's most popular browser. According to multiple security firms, the vulnerability has been used in active ...
Samsung has had its security-enhanced smartphones and tablets approved for use by the U.S. military. The U.S. Department of Defence (DoD) says it is now happy to use Samsung Android devices in the field after its Defence Information ...
Tags: Samsung, Smartphones
An Algerian sought in connection with the "SpyEye" computer virus designed to steal financial and personal information was extradited by Thailand to the United States to face charges, officials said Friday. The US Justice Department said ...
Tags: Computer Products, Algerian Man
A subdomain of a U.S. Department of Labor website appeared offline on Wednesday after an apparent hack that looks similar to a known China-based hacking campaign nicknamed DeepPanda. The tampered page, called Site Exposure Matrices (SEM), ...
Tags: Labor Website, Computer Products
Consumers' home PCs were no safer than they were last year, our annual State of the Net survey found. Heavy spam afflicted 43 percent of those surveyed. We've used our survey to extrapolate the number of consumers affected nationally. ...
Technology organisations are among the most frequently attacked by hackers, according to the latest ‘Advanced Cyber Attack Landscape’ report and interactive maps by FireEye. The report and maps provide detailed insight into ...
Tags: Tech Companies, Computer Products