A four-year-old vulnerability could infect 99 per cent of Android devices with Trojan malware without users even realising, a team of security researchers has claimed. A blog post by Bluebox CTO Jeff Forristal said the vulnerability has ...
Tags: Android, virus, data safety
A recent targeted attack that used Chinese malware compromised over 1,000 computers belonging to dozens of South Korea organizations, according to researchers from Israeli security firm Seculert. The main malware tool used in the attack ...
Microsoft took a two-year-old contest and turned it on its head to come up with a new reward program that will pay security researchers up to $100,000 for demonstrating novel attack tactics against Windows 8.1. In a broad announcement ...
Tags: Microsoft, Windows 8.1, Bounty Program
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to ...
Tags: SAP Security, HTTP Services
Java continues to be Public Enemy No. 1 when it comes to computer and network security. Oracle released a huge update for the virtually ubiquitous software, but attackers aren’t done exploiting Java as the weakest link in the security ...
Tags: Java Update, Oracle
Microsoft will pay security researchers for finding and reporting vulnerabilities in the preview version of its Internet Explorer 11 (IE 11) browser, for finding novel techniques to bypass exploit mitigations present in Windows 8.1 or later ...
Tags: Microsoft, Windows 8, IE, Security Bounty Programs
A newly discovered Trojan program exploits previously unknown flaws in Android and borrows techniques from Windows malware in order to evade detection and achieve persistence on infected devices. Security researchers from antivirus firm ...
Apple on Tuesday updated OS X Mountain Lion, likely for one of the last times, with a combination of compatibility and reliability bug fixes as well as vulnerability patches. The update to OS X 10.8.4 -- the first from Apple since ...
Tags: Apple, Lion Bugs, Java Defenses
Google threw the gauntlet down before the software industry to clean up its mistakes faster than has been done in the past. Critical vulnerabilities in software programs being actively exploited by hackers should be made public seven days ...
Oracle plans to make changes to strengthen the security of Java, including fixing its certificate revocation checking feature, preventing unsigned applets from being executed by default and adding centralized management options with ...
Tags: Oracle, Java Security Improvement
IDG News Service - Google wants vendors to fix or offer mitigation advice for previously unknown and actively exploited software vulnerabilities within seven days of their discovery. "After 7 days have elapsed without a patch or advisory, ...
Tags: Google, Software Vendor
Microsoft today revealed some of the changes in Windows 8 due to reach customers in a month, but didn't address what analysts called the biggest barrier to the OS's success. That would be Windows 8 apps, dubbed "Modern" apps, or if one ...
A 17-year-old German student contends PayPal has denied him a reward for finding a vulnerability in its website. Robert Kugler said he notified PayPal of the vulnerability on May 19. He said he was informed by email that because he is ...
Tags: Computer Products, software
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems. The malware, which was ...
Tags: Computer Products, software
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish anti-virus ...
Tags: Computer Products, software