Attackers using two recently-uncovered Java unpatched vulnerabilities, or "zero-days," have quickly expanded their reach by going mainstream, security experts said today. And on Tuesday, Mozilla, maker of Firefox, joined the chorus of ...
Tags: Java, unpatched vulnerabilities, mainstream, security experts
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
The Iranian government appears to have blocked access to Google’s search engine and Gmail webmail service from inside Iran, according to Internet users there. A security researcher going by the Twitter handle of @0xal reported that ...
Tags: Blocked, cyber attack, Gmail, Google, Security
Microsoft has uncovered a vulnerability in the PC supply chain that allows hackers to pre-install malware-infected copies of Windows onto new machines. As a result, the company has received approval from a federal court to strangle a ...
Tags: Microsoft, PC, surgical sinkhole
Accusations that an Android-based botnet is spewing spam may, in fact, be no such thing, but instead a sign that criminals are exploiting bugs in the Yahoo Mail app for Google's mobile operating system, a security firm said today. ...
Tags: spam, Android, Yahoo Mail app
As many as 300,000 PCs and Macs will drop off the Internet in about 65 hours unless their owners heed last-minute calls to scrub their machines of malware. According to a group of security experts formed to combat DNSChanger, between a ...
Tags: Internet, PCs and Macs, infected computers
The planned introduction of more than 1,900 new generic top-level domain (gTLD) names by Internet Corporation for Assigned Names and Numbers (Icann) could have security implications, researchers have warned. The plan to allow web ...
Tags: gTLD, Icann, security implications
The Internet, long viewed as a tool to expand freedom, is an equally effective tool for repression. That is just as true in the United States as anywhere else. Security guru Bruce Schneier noted in a recent blog post, citing Evgeny ...
Tags: Cyber spying, Middle East, Skype, Spying, Syria, video
The creators of the Flame and Stuxnet malware cooperated at least once during the early stages of development, security researchers have found. A link between the two suggests a connection between Flame and US involvement. At the ...
Bank employees, not customers, are now the main target of financial cyber attacks, according to the FBI. In a warning issued earlier this week, it said the latest trend by cybercriminals is to get employee login credentials, using spam ...
Tags: BYOD, cyberattack, cybercrime, FBI, highlightedpost, risk, Trojan
A Yahoo user has sued the web portal company for negligence for allowing more than 450,000 user names and passwords to be stolen from one of its sites. Jeff Allan of New Hampshire, whose login credentials were posted online after a ...
Tags: Yahoo, user, personal data breach
Security experts are warning businesses to take the publication of encrypted LinkedIn passwords by a hacker seriously. The professional networking site has confirmed that "some" of the stolen passwords posted online by a hacker correspond ...
Tags: security experts, businesses, LinkedIn passwords, hacker
Seven firms have been chosen to provide the Identity Assurance service required for benefit applicants to the new Universal Credit welfare scheme. The Post Office, Cassidian, Digidentity, Experian, Ingeus, Mydex, and Verizon will deliver ...
Computerworld-Microsoft today patched a dozen vulnerabilities in Internet Explorer(IE),Windows,Word and Exchange,fixing flaws in the new IE10 for the first time and crushing bugs in Windows 8 and Windows RT for the second month running. ...
Tags: Internet Explorer, dozen vulnerabilities, Windows 8, IE10
Researchers from the Georgia Institute of Technology have discovered that almost all browsers currently used in smartphones and tablets are unsafe, so much so that even cyber-security experts are unable to detect when they are visiting ...
Tags: mobile browser, SSL, W3C, TLS