Facebook has patched a serious vulnerability that could have allowed attackers to easily gain access to private user account data and control accounts by tricking users into opening specifically crafted links, a Web application security ...
Tags: Facebook, user account data, company news
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification. Since Mega was launched three weeks ...
Tags: Mega, security bug, file-storage, file-sharing
Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended ...
Tags: Barracuda Networks, security issue, network security appliances
While the world’s online sharing community is excited about Kim Dotcom’s bold new venture, the file-storage and sharing service Mega, it is already drawing criticism from security researchers, who advise not to trust it. The ...
Foxit released version 5.4.5 of its Foxit Reader PDF viewer plug-in on Thursday in order to address a critical remote code execution vulnerability that could have allowed attackers to compromise computers running previous versions of the ...
Tags: Foxit, Foxit Reader PDF viewer, computer, software
Showing what can happen when companies don't periodically review network logs, a software developer working for a large U.S. critical infrastructure company hired a Chinese firm to do his job so he could spend time surfing Reddit and ...
Tags: network logs, software, critical infrastructure, IT
A built-in PDF viewer component based on JavaScript and HTML5 Web technologies has been added to the beta version of Firefox 19, Mozilla said Friday. The browser maker described the built-in PDF viewer as more secure and safer than ...
Tags: Firefox 19, Mozilla, browser
Microsoft and a respected researcher disagreed this week about whether a bug in Windows RT is actually a security vulnerability that should be patched. The bug, revealed Jan. 5 by a hacker known as "clrokr," can be used to bypass a ...
Tags: Microsoft, bug, Windows RT
IDG News Service - Foxit Reader, a PDF viewer application often used as an alternative to the more popular Adobe Reader, contains a critical vulnerability in its browser plug-in component that can be exploited by attackers to execute ...
Going on the most recent security flaw in Java, Oracle should rewrite the programming language completely and start again from scratch, according to Bogdan Botezatu, Senior E-Threat Analyst with Bitdefender, a Romanian-based antivirus ...
Tags: Java, security flaw, Oracle, programming language
Criminals no longer need to stake out a home or a business to monitor the inhabitants'comings and goings.Now they can simply pick up wireless signals broadcast by the building's utility meters. In the US,analogue meters that measure ...
Tags: Wireless Meters, Criminals
The attackers who recently infected the website of the Council on Foreign Relations (CFR) with an exploit for an unpatched vulnerability in Internet Explorer, also targeted the website of Capstone Turbine Corporation, a U.S.-based ...
Tags: CFR, unpatched vulnerability, Internet Explorer, U.S.
IDG News Service-Facebook has restricted the rate at which users can perform phone number searches on its mobile website in order to block a recently disclosed method of harvesting phone numbers. "The ability to search for a person by ...
Tags: facebook, harvest phone numbers
The first stable version of Qubes OS,an open source desktop operating system designed to provide a greater level of security by isolating programs inside virtual machines with different permissions,was released Monday by Polish security ...
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration ...
Tags: Security researcher, botnet, Tor network, DDoS