On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline. NSS Labs research ...
Tags: Computer Products, software
No Microsoft browser rival would comment on, much less confirm, that it reported the omission of the browser ballot to European antitrust regulators. All three of Microsoft's Windows browser competitors -- Google, Mozilla and Opera ...
Tags: Microsoft browser, Google, Mozilla, Opera Software
A day after researchers hacked Chrome and Firefox at the Pwn2Own contest, Google and Mozilla patched their browsers Thursday. The contest also wound down yesterday after hackers had earned a record $480,000 over two days. The update to ...
Tags: Chrome, Firefox, Google Mozilla
Mozilla is taking steps to limit the risk of powerful subordinate Certificate Authority (CA) certificates falling into the hands of attackers and potentially being used to issue rogue certificates for use in SSL snooping attacks. The ...
Tags: Mozilla, browser maker, browser
IDG News Service - Developers now can create audio and video communications applications that work across the Chrome and Firefox browsers without the need for plug-ins. This is possible via the use of WebRTC standard technologies for ...
Tags: Google, Mozilla, Computer Products
IDG News Service - Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate ...
Tags: Google certificate, Google, Microsoft, Internet
Digital certificates issued by an authority in Turkey are being used for "man in the middle" attacks on Google properties, according to warnings issued by both Microsoft and Google. The security flaw was traced to a fraudulent digital ...
Tags: Computer Products, Soft
Digital certificates issued by an authority in Turkey are being used for "man in the middle" attacks on Google properties, according to warnings issued by both Microsoft and Google. The security flaw was traced to a fraudulent digital ...
Tags: Microsoft, Google, Turkey, security flaw
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
Google engineers have volunteered the company's VP8 video codec for an emerging standards project,called WebRTC,that could provide a real time communications protocol for the Web. "We believe that the WebRTC effort represents an ...
Tags: Google, VP8 video codec, WebRTC, a real-time communications protocol
Facebook is to expand its reward scheme for hackers who uncover vulnerabilities in its products to include network vulnerabilities. Details of the expanded scheme are to be announced this week at the DefCon Hacking Conference in Las ...
Tags: Facebook, network vulnerabilities, hackers, DefCon Hacking Conference