Hackers can influence real-time traffic-flow-analysis systems to make people drive into traffic jams or to keep roads clear in areas where a lot of people use Google or Waze navigation systems, a German researcher demonstrated at BlackHat ...
Tags: Hackers, software, Computer Products, system, google map
Adobe today patched Flash Player, the fifth time this year it's updated the vulnerability-plagued software. Unlike two of the three updates last month, however, today's was part of Adobe's regularly-scheduled patch cadence. Last ...
As part of its monthly issue of software patches, Microsoft has fixed a Windows vulnerability that would have allowed someone to subvert a computer's security using only a USB thumb drive and some attack code. The vulnerability, MS13-027, ...
Tags: Microsoft, USB hijack, software patches
Until late January, Apple's App Store servers did not encrypt all communications with iOS clients, which exposed users to several potential attacks, according to a Google security researcher. "The Apple App Store and associated ...
Tags: iOS App Store, iOS clients, Apple
A top U.S. official called on China to investigate and stop cyberattacks, which he said pose a growing threat to the countries' economic relationship. Tom Donilon, U.S. President Barack Obama's national security advisor, said the U.S. ...
The London Olympics faced six major cyber attacks during the Games out of some 165 million individual security-related "events" identified by the IT team put together by Gary Pennell, the CIO of the London 2012 Olympics. Cloud was a ...
Romanian security company BitDefender today said it has traced the cyber-espionage malware "MiniDuke" back to June 2011, more than a year and a half before the campaign was uncovered. BitDefender found the malware by digging through its ...
Tags: BitDefender, MiniDuke, espionage malware
The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor ...
Tags: Java, Bit9, technology
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks. The vulnerabilities, identified as CVE-2013-1493 and CVE-2013-0809, are ...
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks. The vulnerabilities, identified as CVE-2013-1493 and CVE-2013-0809, are ...
Tags: Oracle, Emergency Fix, Java Vulnerabilities
China and India were the top two “victim” countries in the Asia Pacific, according to a recent Web threat report. Conducted by Web and mobile security firm Websense, the 2013 Threat Report also ranked Taiwan, Philippines, ...
Tags: China, India, victim countries, the Asia Pacific
A new exploit for a previously unknown and unpatched Java vulnerability is being actively used by attackers to infect computers with malware, according to researchers from security firm FireEye. "We observed successful exploitation ...
Tags: Computer Products, Computer, software
Applying big data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held ...
Tags: information security, RSA Conference 2013, data aggregation
In a move to counter recent reports claiming that a special unit in the Chinese Army is behind repeated cyber attacks on U.S. institutions, the nation Thursday claimed its military and defence ministries websites are routinely hacked from ...
Security researchers have identified an ongoing cyber-espionage campaign that compromised 59 computers belonging to government organizations, research institutes, think tanks and private companies from 23 countries in the past 10 days. ...
Tags: cyber-espionage, computers, cyber security