Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, according to new research. Independent Security Evaluators (ISE), a security consultancy based in ...
Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys. The cameras are sold under ...
Tags: Wireless IP Cameras, Cameras
The Internet Corporation for Assigned Names and Numbers (ICANN) has selected three emergency back-end registry operators to guarantee domain names within a new generic top-level domain (gTLD) will resolve in the event of a failure at a new ...
Tags: Computer Products, software, ICANN
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
A flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers to crash DNS servers and affect the operation of other programs running on the same machines. The flaw stems from the way regular ...
Tags: Computer Products, software
Researchers from security vendor FireEye have uncovered a new advanced persistent threat (APT) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
ICANN's new CEO Fadi Chehade, who took over in October, is on a mission to help politicians around the world understand the importance of keeping the Internet intact and open, and is also working to bring home the addition of new generic ...
Tags: Computer Products, Internet
Google has fully implemented a security feature that ensures a person looking up a website isn't inadvertently directed to a fake one. The Internet company has run its own free public Domain Name System (DNS) lookup service, called Public ...
Tags: Google, Computer Products
The vast majority of 3G and 4G USB modems handed out by mobile operators to their customers are manufactured by a handful of companies and run insecure software, according to two security researchers from Russia. Researchers Nikita ...
Tags: Usb Modems, Computer Products
ICANN’s CEO and President, Fadi Chehadé, was at the group’s Multistakeholder Internet Governance meeting in Africa this week with the message that it is a new season at ICANN and Africa has a big role to play. ICANN ...
IDG News Service - Facebook said Friday it had been the target of a sophisticated hacking attack but that it had no evidence any user data had been compromised. The attack comes two weeks after Twitter asked 250,000 of its users to reset ...
Facebook has admitted that laptops belonging to its employees were recently infected by malware, blaming a zero-day Java exploit for the incident. Users of the social network will be concerned that their private data may have been ...
Tags: Facebook, malware, zero-day Java exploit
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification. Since Mega was launched three weeks ...
Tags: Mega, security bug, file-storage, file-sharing
HP announced last week that it plans to use its recently unveiled SDN controller to distribute its TippingPoint intrusion prevention system across networks. This will help to overcome the scale limitations of dedicated appliances, the firm ...
Tags: HP, SDN, TippingPoint
Hewlett-Packard plans to use its recently announced SDN controller to distribute its TippingPoint intrusion prevention system across networks, overcoming the scale limitations of dedicated appliances. The research project, called ...
Tags: HP, Network Security, SDN