Customer satisfaction with Microsoft's software, primarily Windows, dropped slightly in the last year, likely part of the fallout over Windows 8, a national survey released today said. Microsoft scored 74 points, down a point from the ...
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway. Security researcher and privacy activist Jacob Appelbaum found the ...
Tags: Computer Products, software
Hackers are finding it pays to call ahead before sending malware-laden email. Symantec has seen what it describes as a sophisticated social engineering campaign aimed at French-speaking accounting and finance department employees. The ...
Tags: Malware, Computer Products
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers. The vulnerability is identified as CVE-2013-3336 and ...
Tags: Adobe, ColdFusion
Two U.S. senators will push Congress or President Barack Obama's administration to pursue trade and immigration sanctions against China and other countries that allegedly support cyberattacks on U.S. government agencies and businesses, the ...
Tags: Support Cyberattacks, Barack Obama
The UK continues to struggle against cyber criminals with no clear victory in sight. That's what the House of Commons Home Affairs Committee heard from the cyber security industry as experts gave evidence about e-crime. "I don't think the ...
Tags: Computer Products, software
A growing interest in big data, analytics, and cloud computing helped propel a weak software enterprise market last year, according to research from IDC. SAP and Oracle fared the best among the large software vendors. The worldwide ...
Tags: Computer Products, software
A growing interest in big data, analytics, and cloud computing helped propel a weak software enterprise market last year, according to research from IDC. SAP and Oracle fared the best among the large software vendors. The worldwide ...
Tags: Computer Products, software
Cyber criminals are increasingly targeting small businesses due to their less sophisticated defences, according to a new report from Symantec. Companies with 250 employees or less absorbed 18 percent of targeted cyber attacks in 2011, but ...
Tags: Computer Products, software
Security firm Symantec has found that banking Trojan Shylock – malware which aims to infect computers – is currently targeting more than 60 financial institutions, the majority of which are in the UK. In a blog, the firm ...
Tags: Computer Products, software
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface. The vulnerabilities could allow ...
Tags: Web Security Appliance, Security, Computer Products, web, Security vendor
A new version of the TDL rootkit-type malware program downloads and abuses an open-source library called the Chromium Embedded Framework that allows developers to embed the Chromium Web rendering engine inside their own applications, ...
Tags: Malware, Chromium Embedded Framework, system
The US government plans to reinforce its cybersecurity programme by expanding web monitoring, using a process which currently scans traffic going in and out of defence contractors and expanding it to private firms. That means employees of ...
Tags: US, Computer Products, web monitoring
Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European ...
Tags: Cyberespionage Operation, CrySyS Lab, Computer Products
The Cyber Security Challenge (CSC) is not only about recruiting talent, but is aimed at raising awareness and widening the IT security talent pool, according to the competition's CEO, Stephanie Danan. Danan was responding to Computing's ...
Tags: Cyber Security, IT security, cyber