Java continues to be Public Enemy No. 1 when it comes to computer and network security. Oracle released a huge update for the virtually ubiquitous software, but attackers aren’t done exploiting Java as the weakest link in the security ...
Tags: Java Update, Oracle
The average organisation believes it would spot a data breach in 10 hours, a McAfee global survey of IT professionals has found. But is that result good, indifferent or an indication of the downright complacent? The firm’s ...
Tags: Data Breaches, McAfee
The inability of businesses to properly store and analyse big data leaves them vulnerable to security breaches. That is according to research by security provider McAfee, which finds just 35 per cent of organisations can quickly detect ...
Tags: Improper Big Data Storage, McAfee
A study finds that just 35% of businesses can quickly detect security breaches and 58% store big security data for three months or less. McAfee have released a study that reveals how organisations around the world are unable to harness ...
Tags: Big Data, Security Breaches, McAfee
Last week's attack on the Virgin Radio Dubai website could have provided cyber-criminals with a springboard from which to launch targeted attacks, according to a researcher from Kaspersky Lab. The popular music station's website was taken ...
Tags: Computer Products
A newly discovered Trojan program exploits previously unknown flaws in Android and borrows techniques from Windows malware in order to evade detection and achieve persistence on infected devices. Security researchers from antivirus firm ...
Medical device makers should take new steps to protect their products from malware and cyberattacks or face the possibility that U.S. Food and Drug Administration won't approve their devices for use, the FDA said. The FDA issued new ...
Android smartphones and tablets are under attack, and the most popular tools developed to protect them are easily circumvented, according to new research from Northwestern University and the University of North Carolina. The researchers ...
Tags: Computer Products
Microsoft and the FBI have taken aim at a botnet network based on malware called Citadel that is held responsible for stealing people's online banking information and personal identities. The company, however, warned that because of ...
Tags: Computer Products, Microsoft
Apple on Tuesday updated OS X Mountain Lion, likely for one of the last times, with a combination of compatibility and reliability bug fixes as well as vulnerability patches. The update to OS X 10.8.4 -- the first from Apple since ...
Tags: Apple, Lion Bugs, Java Defenses
Google is pushing out a software update for Glass that improves the capabilities of one of the most popular features - the camera. The automatic update will be sent to Glass users over the next few days, according to a blog post on the ...
The number of malware samples that use P-to-P (peer-to-peer) communications has increased fivefold during the past 12 months, according to researchers from security firm Damballa. The largest contributors to this increase are advanced ...
Early Monday, a developer announced the release of the first porn app for Google Glass only to learn that Google had banned porn apps for its computerized eyeglasses. MiKandi, an adult app store, created a piece of Glassware that enables ...
Tags: Google Glass, Porn
An ongoing cyberespionage campaign compromised over 350 high-profile victims from more than 40 countries over the past eight years, including political activists, research centers, governmental institutions, embassies, military contractors ...
Despite the growing threat of state-sponsored cyberattacks launched from China and other countries, U.S companies should not be allowed to fight back on their own, security experts say. Such corporate counterstrikes would undermine ...
Tags: Computer Products, web surcrity