Yahoo today said it has fixed the flaw that allowed hackers to steal more than 450,000 passwords from one of its many services. The company also provided more information about whose passwords had been pilfered. "We have...now fixed ...
Microsoft today released an emergency patch for Internet Explorer (IE) to stymie active attacks that have been exploiting a bug in the browser, finishing a job it started only Monday. "Let's call it five days from advisory to patch," said ...
Tags: Microsoft, emergency patch, IE, stymie active attacks, bug
Just days after a former employee blasted Mozilla for its frequent updates, the company on Tuesday shipped Firefox 14, patching 18 vulnerabilities and adding automatic encryption of searches passed to Google's search engine. The upgrade ...
Tags: Mozilla, Firefox 14, vulnerabilities, automatic encryption, Google
Microsoft today patched 20 vulnerabilities in Word, Office, Windows, SharePoint Server, SQL Server and other products in its portfolio, including a critical bug in the company's popular Word program and another already used to attack the ...
Tags: Microsoft, vulnerabilities, Word, Office, Windows, SharePoint Server
Mozilla re-released Firefox 16 today after pulling the browser from distribution Wednesday when one of its developers found a critical bug that could be used by attackers to hijack machines. At around 2:30 p.m. ET, Mozilla turned on its ...
Tags: Mozilla, Firefox 16, browser, critical bug, attackers, hijack machines
Twitter has restricted the ability of attackers to post tweets and perform other actions on behalf of many users who have phone numbers associated with their accounts, but some users need to enable a PIN option in order to be protected. ...
Tags: Twitter, attackers, phone numbers, PIN option, SMS
An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
The Iranian government appears to have blocked access to Google's search engine and Gmail webmail service from inside Iran, according to Internet users there. A security researcher going by the Twitter handle of @0xal reported late Sunday ...
Tags: Iran, Blocks Access, Gmail, Google
With only a week left to go until Christmas, the iPad mini has been crowned the most looked-for festive gift of 2012. That is according to online shopping website PriceGrabber.co.uk, which based its findings on website analytics for 1 ...
Tags: Ipad Mini, Christmas Gift, Ipad, Consumer Electronics
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. The vulnerabilities -- a session hijack, a heap ...
Tags: critical vulnerabilities, Huawei, Defcon, security
A new Trojan horse tries to covers its tracks by crippling the victim's computer after stealing data, a security researcher said today. Dubbed "Shamoon" by most antivirus companies, the malware has been used in targeted attacks aimed at ...
Tags: Trojan horse, tracks, victim's computer, shamoon malware, Windows PCs
Facebook Gifts, the new social gifting service launched by Facebook on Thursday, might encourage users to expose information like their home addresses, birth date, clothing or shoe size that could pose security and privacy risks, according ...
Tags: Facebook Gifts, social gifting service, Facebook, users, information
A researcher scored again against Oracles database by demonstrating at the Black Hat security conference Thursday an exploit that would allow him to take control as an administrator. David Litchfield, a researcher at Accuvant Labs, demoed ...
Tags: Oracles database, Black Hat, security conference, David Litchfield
Attackers can abuse Facebook's phone search feature to find valid phone numbers and the names of their owners, according to security researchers. The attack is possible because Facebook doesn't limit the number of phone number searches ...
Tags: Facebook, phone search feature, valid phone numbers, security researchers