Apple on Tuesday updated OS X Mountain Lion, likely for one of the last times, with a combination of compatibility and reliability bug fixes as well as vulnerability patches. The update to OS X 10.8.4 -- the first from Apple since ...
Tags: Apple, Lion Bugs, Java Defenses
Google today patched 12 vulnerabilities in Chrome, including one of the few labeled "critical" that it has fixed in the five-year history of its browser. Tuesday's update to the "stable" build channel -- analogous to a production version ...
An ongoing cyberespionage campaign compromised over 350 high-profile victims from more than 40 countries over the past eight years, including political activists, research centers, governmental institutions, embassies, military contractors ...
Google threw the gauntlet down before the software industry to clean up its mistakes faster than has been done in the past. Critical vulnerabilities in software programs being actively exploited by hackers should be made public seven days ...
Oracle plans to make changes to strengthen the security of Java, including fixing its certificate revocation checking feature, preventing unsigned applets from being executed by default and adding centralized management options with ...
Tags: Oracle, Java Security Improvement
IDG News Service - Google wants vendors to fix or offer mitigation advice for previously unknown and actively exploited software vulnerabilities within seven days of their discovery. "After 7 days have elapsed without a patch or advisory, ...
Tags: Google, Software Vendor
A 17-year-old German student contends PayPal has denied him a reward for finding a vulnerability in its website. Robert Kugler said he notified PayPal of the vulnerability on May 19. He said he was informed by email that because he is ...
Tags: Computer Products, software
Hackers are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a botnet. The Ruby on Rails development team released a security patch for ...
Tags: Ruby on Rails, Hacker, Botnet
A survey of U.S. utilities shows many are facing frequent cyberattacks that could threaten a highly interdependent power grid supplying more than 300 million people, according to a congressional report. More than a dozen utilities said ...
Tags: US, Cyberattack, Power Companies
A Google security engineer accused Microsoft of treating outside researchers with "great hostility" just days before posting details of an unpatched vulnerability in Windows that could be used to crash PCs or gain additional access rights. ...
Tags: Google, Computer Products, Microsoft
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
Google today upgraded Chrome to version 27, touting it as 5% faster as it patched 13 vulnerabilities. The upgrade was the first since March 26, when Google plumped Chrome 26 into the release channel, the most polished of its three public ...
Tags: Google, Chrome, Computer Products
A survey of U.S. utilities shows many are facing frequent cyber-attacks that could threaten a highly interdependent power grid supplying more than 300 million people, according to a congressional report. More than a dozen utilities said ...
Tags: attack, China, CNME, computer news middle east, congress, constant
China's remarkable success at infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology expertise. State-sponsored hacking ...
Tags: Computer Products, Hackers, networks