Google today patched 10 vulnerabilities in Chrome, just two days before the start of Pwn2Own, a hacking contest that has $100,000 in prize money waiting for the first researcher to crack the browser. In an update Monday for the Windows ...
Tags: Google, Service, web service
Internet Explorer's poor reputation for security is undeserved, with Mozilla Firefox actually the most vulnerable internet browser in common usage. That's according to research by network security solutions provider Sourcefire, which ...
UK - James Thomas Engineering has announced the appointment of White Light as exclusive distributor of their new JT30 & JT40 truss products. The two truss products mark a new direction for James Thomas. Paul Young explains, "We have gone ...
Tags: White Light, Light, James Thomas lines
A Polish security firm known for rooting out Java vulnerabilities has reported two new bugs in the browser plug-in to Oracle, Security Explorations said today. On its bug-reporting status page, Security Explorations noted that it had ...
Tags: Java vulnerabilitie, Oracle, company news
Smartphone manufacturer HTC has agreed to settle Federal Trade Commission (FTC) charges that the firm failed to take "reasonable steps" to patch security vulnerabilities in its products, thus putting information belonging to millions of ...
Tags: HTC, obile Security Flaws, company news
The US Federal Trade Commission said HTC agreed "to develop and release software patches to fix vulnerabilities found in millions of HTC devices." No financial penalty against the company was announced. The FTC said it investigated ...
Tags: HTC, HTC Devices, software
The U.S. Federal Trade Commission has reached a settlement with HTC America over security holes in the company's smartphone and tablet software that left millions of users' personal information at risk. Under the terms of the agreement, ...
Tags: HTC America, smartphone, tablet, software
Google yesterday released Chrome 25, patching 22 vulnerabilitiesand debuting a new security feature that blocks silent installations of add-ons. The latter is Chrome 25's most noticeable change to users. It automatically disables ...
Tags: Google, security feature, Chrome
Buying new sofas and chairs is a major investment. We want you to be delighted with your choice of sofa or chair, so take some time to think about the best options for you and your home before you buy. Size of sofa Any choice you make ...
Tags: Sofa Bed
The Microsoft Surface Pro delivers on its promise to provide the most laptop-like performance yet from a tablet. But like most groundbreaking devices, it has flaws—including limited storage and hefty weight and size—that mean ...
Tags: Microsoft Surface Pro, tablet, super-tablet, company news
The reported literature on c. This review finds that protocols for proper rheological measurements are absent, and that good practice is often violated when modelling the rheological behaviour of activated sludge. Rheological behaviour is ...
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification. Since Mega was launched three weeks ...
Tags: Mega, security bug, file-storage, file-sharing
Microsoft this week patched 14 vulnerabilities in Internet Explorer (IE), preparing the browser for its time as a target early next month at the annual Pwn2Own hacking contest. On Tuesday, Microsoft patched 57 vulnerabilities, including ...
Tags: Microsoft, Internet Explorer, patch
Adobe last week announced it would add a new security feature to Flash Player in an attempt to block some of the exploits hackers are hiding inside older Microsoft Office documents. The new feature -- a pop-up warning -- will be triggered ...
Tags: Adobe, security feature, Flash Player
Devices used by many radio and TV stations to broadcast emergency messages as part of the U.S. Emergency Alert System (EAS) contain critical vulnerabilities that expose them to remote hacker attacks, according to researchers from security ...
Tags: U.S.Emergency Alert System, remote hacker attacks, cyber security