Computerworld - Mozilla on Tuesday shipped its newest browser, Firefox 18, which sports a revamped JavaScript engine and support for Macs with Apple's higher-resolution Retina displays. The open-source developer also patched 28 security ...
Tags: Mozilla, browser, Firefox 18, JavaScript engine
The British military could be exposed to cyber attack and a complacent government has failed to take preventative action to protect it. The failings could leave forces dangerously exposed in the event of war. That is the damning ...
CSO - A researcher has bypassed Microsoft's temporary fix for a zero-day Internet Explorer browser vulnerability that hackers have been exploiting for a month. The exploit, developed by Peter Vreugdenhil of the vulnerability analysis ...
Tags: Microsoft, IE, Windows XP system, computer
Computerworld - An elite hacker group credited last year with having an inexhaustible supply of zero-day vulnerabilities was responsible for digging up and first using the newest unpatched bug in Internet Explorer (IE), a Symantec manager ...
Tags: hacker group, Internet Explorer, IE, Windows PCs
A zero day exploit in Internet Explorer,which Microsoft released a temporary fix for last week,has resurfaced as the fix itself has now been cracked. The original vulnerability was discovered two weeks ago,and so far no permanent ...
Tags: zero day exploit, Internet Explorer, Microsoft, vulnerability, malware
Microsoft on Saturday confirmed that Internet Explorer (IE) 6, 7 and 8 contain an unpatched bug -- or "zero-day" vulnerability -- that is being used by attackers to hijack victims' Windows computers. The company is "working around the ...
Tags: Microsoft, IE, unpatched bug, vulnerability
Microsoft has responded to public reports of a zero-day vulnerability in Internet Explorer (IE) 6, 7 and 8, suggesting temporary measures to help users to mitigate the issue. The vulnerability could allow a remote attacker to hack into a ...
Tags: Microsoft, vulnerability, IE, users
Microsoft today said it will release seven security updates next week--including one rated critical for Windows 8 and Windows RT--to patch 12 vulnerabilities in Windows,Office,SharePoint Server and the company's website design software. ...
Attackers are exploiting a "zero-day" vulnerability in Microsoft's Internet Explorer (IE) and hijacking Windows PCs that cruise to malicious or compromised websites, security experts said Monday. Microsoft confirmed the IE bug, saying, ...
Tags: Hackers, IE, Computer Products
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
Computerworld - An elite hacker group targeting defense industry sub-contractors has an inexhaustible supply of zero-days, or vulnerabilities that have yet to be publicized, much less patched, Symantec said today. In a blog post, the ...
Tags: Elite hacker gang, zero day bugs, Google, hackers, zero day
A hacker is selling a$700 zero-day exploit for Yahoo Mail that lets an attacker use a cross-site scripting(XSS)vulnerability to steal cookies and hijack accounts. The hacker,known as"TheHell",created a video to market the exploit on an ...
Tags: hacker, Yahoo mail
A marketplace where security researchers can sell details on software bugs said it was compromised on Tuesday due to an "embarrassing oversight" that left its web server vulnerable. ExploitHub, based in Austin, Texas, has an online ...
Tags: ExploitHub, software, software bugs, web server, SQL database
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products