Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
A new piece of malicious software targeted at Apple users has been found on a website dedicated to the Dalai Lama, but one security vendor is labeling it as low risk. The malware, nicknamed "Dockster," is a backdoor that allows an ...
Tags: malicious software, Apple users, website, Dalai Lama
A security scare for Microsoft users hit late yesterday, after vulnerability management company Rapid7's Metasploit penetration tool project discovered an Internet Explorer exploit that is said to affect all browsers earlier than IE9, and ...
European chemicals output will contract by 2.0 per cent in 2012 compared with 2011, European chemicals group Cefic said. A lowering of its forecast released in September, the chemicals trade body downgrade reflects recent data showing a ...
Tags: chemical sector, chemical, chemicals output, chemicals group
The recently launched Adobe Reader and Adobe Acrobat XI come with new security features and an improved sandbox that will make the products harder to attack and exploit, according to Adobe. The sandboxing feature known as the Protected ...
Tags: Adobe Reader, Adobe Acrobat XI, security features, sandbox
A security researcher claims that he found 23 vulnerabilities in industrial control software from several vendors after a different security company last week showcased vulnerabilities in applications from some of the same manufacturers, ...
Tags: security researcher, vulnerabilities, industrial control software
Google has expanded its legal agreement with developers working on Android applications to specifically prohibit them from taking any action that could lead to a fragmentation of the operating system. The prohibition was added to the ...
Tags: Google, legal agreement, Android applications, fragmentation
Chief information security officers (CISOs) have an important role in moving their organisations, whether they are public or private, to a cloud computing environment, according to professional certification body (ISC)2. The move is ...
Tags: cloud computing, Chief information security officers, software, computer
Google, Microsoft and Yahoo have remedied a cryptographic weakness in their email systems that could allow an attacker to create a spoofed message that passes a mathematical security verification. The weakness affects DKIM, or DomainKeys ...
Tags: Google, Microsoft, Yahoo, cryptographic weakness, email systems
An exploit for an unpatched vulnerability in the Microsoft XML Core Services (MSXML) has been incorporated into Blackhole, one of the most widely used Web attack toolkits, according to security researchers from antivirus firm Sophos. The ...
Tags: vulnerability, Microsoft, MSXML, Blackhole, Web attack toolkits
Adobe on Tuesday announced that it will pair future security updates for its popular Flash Player with Microsoft's Patch Tuesday schedule. At the same time, Adobe issued an update that patched seven critical Flash vulnerabilities, and ...
Tags: Adobe, security updates, popular Flash Player, Microsoft
IDG News Service - Oracle has sued former partner CedarCrestone on grounds it has been providing third-party support for Oracle's software in an illegal fashion, a move that echoes previous actions Oracle took against former SAP subsidiary ...
Tags: Oracle, CedarCrestone, software, SAP
IDG News Service - Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. ...
IDG News Service - Java vulnerabilities are increasingly exploited by attackers to infect computers, and the problem could become worse if Oracle doesn't do more to secure the product and keep its installation base up to date, according to ...
Tags: Java vulnerabilities, computers, Oracle, Flash Player, Adobe Reader
Network World - To handle the explosion of mobile devices in the enterprise, Dell this week unveiled plans for a server designed to automate a wide range of mobile management jobs for mid-range business customers. The K3000 Mobile ...
Tags: mobile devices, Dell, Dell server, company news