Osun State University has entered into a memorandum of understanding (MoU) with two Canadian universities to carry out research on the ‘Sustainable Production and Utilisation of Under-utilised Nigerian Vegetables’, a move which ...
Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data. Tom Ritter and Doug DePerry , researchers ...
Tags: Phone Calls, Exploit Cellular Tech
Java continues to be Public Enemy No. 1 when it comes to computer and network security. Oracle released a huge update for the virtually ubiquitous software, but attackers aren’t done exploiting Java as the weakest link in the security ...
Tags: Java Update, Oracle
Fresh from yesterday's revelations about BlackBerry security holes discovered by GCHQ at 2009's G20 meetings, BlackBerry is fighting similar claims against its newest BlackBerry 10 platform. BlackBerry posted an advisory on its Knowledge ...
Tags: Blackberry, Z10
IDG News Service - Google wants vendors to fix or offer mitigation advice for previously unknown and actively exploited software vulnerabilities within seven days of their discovery. "After 7 days have elapsed without a patch or advisory, ...
Tags: Google, Software Vendor
Hackers are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a botnet. The Ruby on Rails development team released a security patch for ...
Tags: Ruby on Rails, Hacker, Botnet
Java vulnerability hunters from Polish security research firm Security Explorations claim to have found a new vulnerability that affects the latest desktop and server versions of the Java Runtime Environment (JRE). The vulnerability is ...
Tags: Computer Products, software
Indian outsourcing and services company Infosys has teamed up with Queen's University Belfast to conduct joint research into the global cyber security threat. The partnership brings together Queen's University Belfast's Centre for Secure ...
Tags: Computer Products, Computer
Ex-Metropolitan Police cyber crime detective and current MD of Cyber Security Consulting - which still handles government contracts - Adrian Culley has told Computing that the government's £650m budget for cyber security is not ...
Tags: Cyber Security, Computer Products
Foreign secretary William Hague has announced the devotion of £500,000 a year to the opening and running of a global cyber research centre to be sited at the Oxford Martin School at the University of Oxford. The Global Centre for ...
The government's spy agency, GCHQ, has launched an Academic Research Institute to investigate new ways of automatically analysing software to reduce its vulnerability to cyber threats. It is the second institute focused on cyber security ...
Tags: GCHQ, economy, Cyber Research
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who say the extent of the problem is exaggerated. The security industry has an ...
Tags: antivirus companies, Android malware threats, credibility issue
Microsoft has confirmed that it's the latest among a number of high-profile technology and internet firms to have been hit by a cyber attack. A blog posted on Friday by Microsoft security manager Matt Thomlinson revealed: Java is a ...
Tags: Microsoft, cyber attack, cyber security
Mozilla is taking steps to limit the risk of powerful subordinate Certificate Authority (CA) certificates falling into the hands of attackers and potentially being used to issue rogue certificates for use in SSL snooping attacks. The ...
Tags: Mozilla, browser maker, browser
The UK and India are expected to strike a deal to become trusted partners in the growing battle against cyber criminals and nation states, prime minister David Cameron has said. Reuters reports that the UK hopes that by setting up a joint ...