Hewlett-Packard plans to use its recently announced SDN controller to distribute its TippingPoint intrusion prevention system across networks, overcoming the scale limitations of dedicated appliances. The research project, called ...
Tags: HP, Network Security, SDN
Tens of millions of network-enabled devices including routers, printers, media servers, IP cameras, smart TVs and more can be attacked over the Internet because of dangerous flaws in their implementation of the UPnP (Universal Plug and ...
Tags: network-enabled devices, routers, printers, media servers, IP cameras
Representatives of newly launched file-storage and sharing service Mega addressed some of the concerns raised by security researchers in recent days about the site's architecture and the implementation of its cryptographic features. In a ...
Tags: file-storage, sharing service, Mega
Many of the domain names used by a cybercriminal gang to control computers infected with the Virut malware were disabled last week in a coordinated takedown effort, Spamhaus, an organization dedicated to fighting spam, announced Saturday. ...
The website for Reporters Without Borders was booby-trapped to deliver malicious software using the latest Java and Internet Explorer vulnerabilities, security vendor Avast said on Tuesday. Reporters Without Borders, based in Paris, is an ...
Researchers from Security Explorations, a Poland-based vulnerability research firm, claim to have found two new vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software's security sandbox and execute arbitrary code ...
While the world’s online sharing community is excited about Kim Dotcom’s bold new venture, the file-storage and sharing service Mega, it is already drawing criticism from security researchers, who advise not to trust it. The ...
The Virut botnet suffered a major setback last week, after it was announced that many of the domain names used by a cybercriminal gang to control computers infected with the malware had been disabled. This was the result of coordinated ...
The Shylock home banking malware has been updated with new functionality that allows it to spread automatically using the popular Skype Voice-over-IP (VoIP) and instant messaging client. Shylock, named after a character from Shakespeare's ...
Tags: banking malware, Shylock, Skype Voice-over-IP, network security
Showing what can happen when companies don't periodically review network logs, a software developer working for a large U.S. critical infrastructure company hired a Chinese firm to do his job so he could spend time surfing Reddit and ...
Tags: network logs, software, critical infrastructure, IT
Researchers from a Poland-based vulnerability research firm on Friday announced that they had found vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software’s security sandbox and execute arbitrary code on ...
Tags: Researchers, Java, Security Flaw
Oracle’s bad Java week got worse on Wednesday, after it was announced that a previously unknown flaw in the programming language still threatens the security of millions of PCs. This is despite the fact that Oracle issued an emergency ...
Tags: Oracle, bad Java, unknown flaw
The hundreds of ctargeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as previously believed, but also by using Web-based Java exploits, according to ...
Tags: cyberespionage, Red October Cyberespionage Attacks, cyber security
Internet users should consider disabling Java in their browsers because of an exploit that can allow remote attackers to execute code on a vulnerable system, the U.S. Computer Emergency Readiness Team (US-CERT) recommended late Thursday. ...
Tags: Internet user, Java, vulnerable system
An exploit for a previously unknown and currently unpatched vulnerability in Java is being used by cybercriminals to infect computers with malware, according to security researchers. An independent malware researcher who uses the online ...
Tags: exploit, unpatched vulnerability, Java, cybercriminals