The vast majority of 3G and 4G USB modems handed out by mobile operators to their customers are manufactured by a handful of companies and run insecure software, according to two security researchers from Russia. Researchers Nikita ...
Tags: Usb Modems, Computer Products
The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor ...
Tags: Java, Bit9, technology
A new exploit for a previously unknown and unpatched Java vulnerability is being actively used by attackers to infect computers with malware, according to researchers from security firm FireEye. "We observed successful exploitation ...
Tags: Computer Products, Computer, software
Researchers from security firm Symantec have found and analyzed a version of the Stuxnet cybersabotage malware that predates previously discovered versions by at least two years and used a different method of disrupting uranium enrichment ...
Tags: Symantec, Stuxnet cybersabotage malware, disrupting uranium enrichment
Security researchers have identified an ongoing cyber-espionage campaign that compromised 59 computers belonging to government organizations, research institutes, think tanks and private companies from 23 countries in the past 10 days. ...
Tags: cyber-espionage, computers, cyber security
Facebook has patched a serious vulnerability that could have allowed attackers to easily gain access to private user account data and control accounts by tricking users into opening specifically crafted links, a Web application security ...
Tags: Facebook, user account data, company news
Attackers are using fake versions of a recently released report about a Chinese cyberespionage group as bait in new spear-phishing attacks that target Japanese and Chinese users. The report was released Tuesday by security firm Mandiant ...
Tags: cyberespionage, China, cyber security
Oracle released new Java security updates on Tuesday and announced plans to accelerate the release of future Java patches following recent attacks that have infected computers with malware by exploiting zero-day vulnerabilities in Java ...
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification. Since Mega was launched three weeks ...
Tags: Mega, security bug, file-storage, file-sharing
Political activists from the Middle East were targeted in attacks that exploited a previously unknown Flash Player vulnerability to install a so-called lawful interception program designed for law enforcement use, security researchers from ...
Tags: Flash Player, Adobe, mergency update
Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended ...
Tags: Barracuda Networks, security issue, network security appliances
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. "Today, we identified that a PDF zero-day [vulnerability] ...
Tags: FireEye, remote code, Adobe Reader
A new exploit kit called Whitehole has emerged on the underground market, providing cybercriminals with one more tool to infect computers with malware over the Web, security researchers from antivirus vendor Trend Micro reported Wednesday. ...
Tags: Whitehole, underground market, malware, antivirus software
HP announced last week that it plans to use its recently unveiled SDN controller to distribute its TippingPoint intrusion prevention system across networks. This will help to overcome the scale limitations of dedicated appliances, the firm ...
Tags: HP, SDN, TippingPoint
With the increased demand for personalised medicine, the growth in the cryopreservation of biological samples has increased dramatically in recent years and continues today. This increase has created the need for secure, reliable and ...
Tags: Small Volume Cryogenic Samples, vials, cryopreservation