McAfee said it has found a vulnerability in Adobe Systems' Reader program that reveals when and where a PDF document is opened. The issue is not a serious problem and does not allow for remote code execution,?wrote?McAfee's?Haifei Li in a ...
Tags: McAfee Spots, PDF-Tracking Flaw
Madura Fashion and Lifestyle (Madura F&L), a division of Aditya Birla Nuvo Limited, one of India's fastest growing branded apparel companies and a premium lifestyle player in the retail sector, has received ISO 27001 certification covering ...
Tags: Madura Fashion, Apparel
Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys. The cameras are sold under ...
Tags: Wireless IP Cameras, Cameras
e-Cycle LLC, the mobile buyback and recycling company, has earned multiple Global Business Excellence Awards for its service offering and its commitment to adhering to the highest standards of environmental responsibility. The Global ...
Tags: e-Cycle LLC, mobile buyback
Table lift Sets are designed to perform in the most exceptional manner. The design and make of such a lift set is truly exceptional and different from the rest. You can find several brands manufacturing products in the same line and product ...
Tags: Table Lift, Car Maintenance
Facebook Home, the new app that replaces the home screen on an Android smartphone, should be banned from corporate networks to avoid unnecessary security risks, experts say. Facebook introduced Home on Thursday, aiming to give its 1 ...
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface. The vulnerabilities could allow ...
Tags: Web Security Appliance, Security, Computer Products, web, Security vendor
Epicor is suing IT service provider Alternative Technology Solutions, claiming the company illegally used its ERP (enterprise resource planning) software in order to develop and sell add-ons and services, in a case that has parallels to ...
Tags: Software, Computer Products
A three-judge panel of the US Court of Appeals for the District of Columbia on Friday questioned whether it or a federal district court should properly hear the American Petroleum Institute's challenge of a Securities and Exchange ...
Tags: SEC Rule, API Challenge, Chemicals
The US government plans to reinforce its cybersecurity programme by expanding web monitoring, using a process which currently scans traffic going in and out of defence contractors and expanding it to private firms. That means employees of ...
Tags: US, Computer Products, web monitoring
Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European ...
Tags: Cyberespionage Operation, CrySyS Lab, Computer Products
Two researchers from security firm Imperva have devised new techniques that could allow attackers to extract sensitive information from users' encrypted Web traffic. The new methods build on those used in an attack called CRIME revealed ...
Tags: Computer Products, software
Listed companies have been warned to upgrade their disclosure practices in light of new rules from the Australian Securities Exchange or risk enforcement action from the corporate regulator. The Australian Securities & Investment ...
Before you "like" a friend's or company's post on Facebook, think twice. A new study shows that your Facebook "likes" may be far more revealing than you ever thought. Researchers at the University of Cambridge in the U.K. announced on ...
Tags: Facebook, Facebook Could, software, service
nCrypted Cloud, a cloud data privacy company that brings world-class privacy to data stored on cloud storage providers such as Dropbox, GoogleDrive and SkyDrive, has announced the launch of its free nCrypted Cloud service. Nick Stamos, ...
Tags: Free Service, Image Data, cloud storage