DDoS attackers attempted to bring down an unnamed financial services firm earlier this week using one of the largest traffic bombardments ever recorded, mitigation firm Prolexic has reported. The 167 Gbps peak attack hit what is being ...
Tags: DDoS Attack, Financial Firm
IDG News Service - Google wants vendors to fix or offer mitigation advice for previously unknown and actively exploited software vulnerabilities within seven days of their discovery. "After 7 days have elapsed without a patch or advisory, ...
Tags: Google, Software Vendor
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems. The malware, which was ...
Tags: Computer Products, software
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish anti-virus ...
Tags: Computer Products, software
Aiming to better address the security needs of businesses of all sizes that are facing increasingly complex attacks, McAfee has added two endpoint security suites to its product lineup. The suites, announced Tuesday, combine a wide range ...
Tags: McAfee, Business Endpoint Security
Hackers are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a botnet. The Ruby on Rails development team released a security patch for ...
Tags: Ruby on Rails, Hacker, Botnet
CSO - In January 2010, Google shocked the cyber world by confessing it had been the target of an advanced persistent threat lasting months and mounted by hackers connected to China's People Liberation Army. "[We] have evidence to suggest ...
Tags: Computer Products
A Google security engineer accused Microsoft of treating outside researchers with "great hostility" just days before posting details of an unpatched vulnerability in Windows that could be used to crash PCs or gain additional access rights. ...
Tags: Google, Computer Products, Microsoft
Mobile devices are getting hit by a boom in malware similar to the one that hit PCs starting with the rise of the Web, a security software executive said Tuesday. "Mobile platforms, for a lot of attackers, represent a new target-rich ...
Tags: Mobile Malware, Computer Products, Android
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users. KitM (Kumar in the Mac), also known as HackBack, ...
Tags: OS X Spyware, Mac, Computer Products
Google plans to upgrade the security of its Secure Sockets Layer (SSL) certificates, an important component of secure communications. SSL certificates are used to encrypt communication and verify the integrity of another party with which ...
Tags: Google, SSL Encryption Keys, August
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
De Monfort University (DMU) has joined forces with business advisors Deloitte to launch a masters in science (MSc) for cyber security - what it says is the first of its kind in the UK. DMU's Cyber Security Centre experts and Deloitte's ...
Tags: Computer Products, software
A recent intrusion on the computer network of Norwegian telecommunications company Telenor was the result of a large cyberespionage operation of Indian origin that for the past few years has targeted business, government and political ...
Tags: Computer Products, software