Google on Tuesday shipped Chrome 29, patching 25 vulnerabilities and rolling out under-the-hood changes the company said would offer more relevant suggestions when users typed in URLs or search strings. The upgrade also sported a new ...
Tags: Computer Products, google, software
Facebook's "Bug Bounty" programme has paid out $1m in total to users-turned-security-bug-hunters in the past two years, with the youngest recipient being a 13-year-old boy. The largest single "bounty" has been $20,000, and two recipients ...
Tags: Facebook, Amateur Security Testing
Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data. Tom Ritter and Doug DePerry , researchers ...
Tags: Phone Calls, Exploit Cellular Tech
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS ...
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave. ...
Tags: Computer Products, softwre
Microsoft today said that Windows 8.1, slated for release this fall, will use the same lifecycle support timeline as 2012's Windows 8, meaning that it will be supported until early 2023. Windows 8 users will also be required to upgrade to ...
Tags: Microsoft, Windows 8.1, Computer Products, software
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations because most of them have outdated versions of the software ...
Tags: Java, soft security, software, Computer Products
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system. Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and ...
Tags: Computer Products, software
As SAP invests heavily in mobile, a security testing company will release a tool next month to ensure mobile-accessible SAP systems are not vulnerable to hackers. Boston-based Onapsis will release a new module for its X1 security suite, a ...
Tags: SAP systems, Computer Products, software
The government is to review Huawei's Cyber Security Evaluation Centre (the Cell) and will report its findings later in the year. The Chinese telecommunications firm, which has flourished on a global scale in recent years, has been ...
Tags: Computer Products, huawei
Security researchers from Polish vulnerability research firm Security Explorations claim to have identified a new vulnerability in Java 7 that could allow attackers to bypass the software's security sandbox and execute arbitrary code on the ...
Tags: Computer Products, software
The Chinese economy is capable of withstanding shocks, although its facing downside risks from both external and domestic uncertainties, said the International Monetary Fund (IMF) on Wednesday. China's economy "is expected to grow at ...
The Chinese cyber-spies behind the widely publicised espionage campaign against?The New York Times?have added Dropbox and WordPress to their bag of spear-phishing tricks. The gang, known in security circles as the DNSCalc gang, has been ...
Tags: Computer Products, software
The American Institute of Architects (AIA) today announced a communications campaign urging its membership to enter the "Rebuild by Design" multi-stage regional design competition announced by Department of Housing and Urban Development ...
Tags: Construction, Decoration
Microsoft today confirmed that Internet Explorer 11 (IE11) will be ported to Windows 7, but declined to name a release date. The announcement, made during a Wednesday session at the company's BUILD developers conference, was first ...