CSO - A researcher has bypassed Microsoft's temporary fix for a zero-day Internet Explorer browser vulnerability that hackers have been exploiting for a month. The exploit, developed by Peter Vreugdenhil of the vulnerability analysis ...
Tags: Microsoft, IE, Windows XP system, computer
For all the apocalyptic prognostications, 2012 turned out to be a relatively uneventful year from an information security standpoint. A cyber Pearl Harbor did not happen. Stuxnet and its kin did not take out any power grids or shut down ...
Tags: apocalyptic prognostications, 2012, information security, cyber
Attackers are exploiting a "zero-day" vulnerability in Microsoft's Internet Explorer (IE) and hijacking Windows PCs that cruise to malicious or compromised websites, security experts said Monday. Microsoft confirmed the IE bug, saying, ...
Tags: Hackers, IE, Computer Products
A new Flame and Stuxnet-related cyber-threat,dubbed Gauss,is targeting users in the Middle East,security researchers have revealed. Gauss is a complex,state-sponsored cyber-espionage toolkit with online banking Trojan functionality not ...
IT Governance Ltd, the PCI and information security experts, are advising organisations which must comply with the PCI DSS requirements, that successful implementation of the standard can only be achieved through well trained staff. The ...
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE) client. These features will benefit ...
French security firm Intego discovered a new Mac Trojan horse this week that is being used to target specific individuals. The Trojan, dubbed "Crisis" by Intego -- a Mac-only antivirus developer -- and called "Morcut" by Sophos, is ...
Tags: Intego, Mac, Trojan horse, Hacking Toolkit
At the moment it seems as though every manufacturer is quoting ever increasing energy savings and jumping on the energy efficiency bandwagon in order to get you to specify their products. That's fine if the products do achieve the savings ...
Tags: energy, efficiency, control, house
HTML5 is more than a few years old and no longer a curiousity. Web pages that used to simply emulate a piece of paper are now expected to do something snazzy to justify their existence. Thanks to HTML5, along with innovations in JavaScript ...
Tags: HTML5, slide apps, Zoho, Google Docs, Aviary, HootSuite, Scribd, Angry Birds
An exploit for an unpatched vulnerability in the Microsoft XML Core Services (MSXML) has been incorporated into Blackhole, one of the most widely used Web attack toolkits, according to security researchers from antivirus firm Sophos. The ...
Tags: vulnerability, Microsoft, MSXML, Blackhole, Web attack toolkits
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: CoDeSys, software, ICS, vulnerability
IDG News Service - Java vulnerabilities are increasingly exploited by attackers to infect computers, and the problem could become worse if Oracle doesn't do more to secure the product and keep its installation base up to date, according to ...
Tags: Java vulnerabilities, computers, Oracle, Flash Player, Adobe Reader
Infoworld - Hewlett-Packard may be best known for its ubiquitous printers and laptops, but in the enterprise world, it is just as recognized for its servers. Now that the idea of the cloud is taking over, HP is joining the marketplace and ...
Tags: Hewlett Packard, laptop, HP, HP Cloud
Computerworld - Two security organizations have released online tools that let Windows users check for possible infections by Gauss, the newly-revealed cyber surveillance malware thought to have been built by one or more governments. ...
Tags: security organization, online tools, Windows, cyber surveillance
Computerworld - Microsoft today confirmed that it will patch a vulnerability in Windows next week that has been exploited by an increasing number of attacks. Initially, experts wondered whether Microsoft would patch the XML Core Services ...
Tags: Microsoft, Windows, software, computer products