CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: CoDeSys, software, ICS, vulnerability
Microsoft today patched 20 vulnerabilities in Word, Office, Windows, SharePoint Server, SQL Server and other products in its portfolio, including a critical bug in the company's popular Word program and another already used to attack the ...
Tags: Microsoft, vulnerabilities, Word, Office, Windows, SharePoint Server
Microsoft has fixed 26 security holes in its software products – including five deemed "critical" – it said in its monthly security bulletin. The critical vulnerabilities affected Microsoft's Windows operating system, Internet ...
Tags: Microsoft, security holes, software products, critical vulnerabilities
Incident response investigations are increasingly showing businesses cannot rely on antivirus systems alone for protection, say security researchers. The gap is widening between the common malware threats most antivirus systems will ...
Tags: antivirus systems, security researchers, Ziv Mador, banking malware
Amazon is urging people to switch off a safety feature in Android, which prevents rogue apps from being downloaded, to install its own Appstore software. The online retailer has introduced its app store rival to Google Play in the UK and ...
Tags: Amazon, rogue apps, Appstore software, Amazon Appstore
The University of Warwick has entered an agreement with information security professional body (ISC)2 to support the entry of its cyber security masters graduates into the workforce. Students will be able to complete a compact Certified ...
Tags: University of Warwick, CISSP, cyber security, IT security community
An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
When it comes to things that keep CIOs up at night, mobility, particularly bring your own device (BYOD), is at the top of the list or near it. Mobile device management (MDM) products and services are often the reflexive response to the need ...
Tags: CIOs, BYOD, MDM, secure data
With cybercrime revealed to cost Scottish businesses an estimated 5bn academics are urging firms to ensure IT staff have the right skills to overcome new and emerging threats. To enable them to do that, Edinburgh Napier University is ...
Tags: cybercrime, IT staf, IT industry, cyber security
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
According to a new research report from the analyst firm Berg Insight, shipments of wireless M2M modules for security applications in EU27+2 is forecasted to grow from 2.9 million in 2011 at a compound annual growth rate (CAGR) of 47.1 ...
Tags: Security Research Report, shipments of wireless M2M modules
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: Digital Bond, Flaw, patch, vulnerability, control systems
Security researchers have uncovered a highly sophisticated, multi-tiered, global financial fraud ring that has attempted fraudulent transfers of up to 1.6bn from at least 60 banks This fraud empire, discovered by researchers from security ...
Tags: financial fraud, security, banking system, financial security
Google's mobile operating system(OS),Android,has been targeted again by malicious malware,which causes the device to send out spam SMS messages. The infected malware,known as SpamSoldier,has been hiding in free versions of popular Android ...
Tags: Android, Malware, Attack, Google Play Store
The Secure Decisions Division of Applied Visions and developer of MeerCAT , a visualization toolkit for wireless network security, has been selected as a finalist in the Government Security News (GSN) 2012 Homeland Security Awards ...
Tags: MeerCAT, wireless network security, network, IT security