Google said Wednesday it plans to reward developers for developing proactive security improvements for some of the most widely used open-source software programs. The program aims to “improve the security of key third-party software ...
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to ...
Tags: SAP Security, HTTP Services
Hackers are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a botnet. The Ruby on Rails development team released a security patch for ...
Tags: Ruby on Rails, Hacker, Botnet
Just 11 days after issuing an advisory, Microsoft has released a patch for a bug in Internet Explorer 8 that bedeviled the U.S. Department of Labor earlier this month. Microsoft's speedy release of this patch "is an outstanding example of ...
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that ...
Tags: Web software, software, Computer Products
Cybercriminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all ...
Tags: Hackers Target, Computer Products
Cyber criminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all ...
Tags: Hackers, Web Hosting Servers
The volume, duration and frequency of distributed denial-of-service (DDOS) attacks used to flood websites and other systems with junk traffic have significantly increased during the first three months of this year, according to a report ...
Tags: Computer Products, software
A U.S. government computer vulnerability database and several other websites at the National Institute of Standards and Technology have been down for nearly a week after workers there found malware on two Web servers. NIST's National ...
Two researchers from security firm Imperva have devised new techniques that could allow attackers to extract sensitive information from users' encrypted Web traffic. The new methods build on those used in an attack called CRIME revealed ...
Tags: Computer Products, software
Bit9 said a common Web application vulnerability was responsible for allowing hackers to ironically use the security vendor's systems as a launch pad for attacks on other organizations. Based in Waltham, Massachusetts, the company sells a ...
Tags: Bit9, Web application vulnerability, network
Several Certificate Authorities (CAs) have formed an advocacy group called the Certificate Authority Security Council (CASC), which will focus on promoting new security standards, policies and best practices for SSL (Secure Sockets Layer) ...
Tags: CAs, web security, SSL deployment
Symantec on Wednesday began offering multi-algorithm SSL certificates for Web servers that go beyond traditional crypto to include what’s known as the Elliptic Curve Cryptography (ECC) Digital Signature Algorithm (DSA). The firm ...
Tags: Symantec, SSL certificates, Web servers
Facebook's Open Compute Project is being expanded to incorporate ARM processors, providing new options for companies shopping for low-cost hardware to build out cloud computing environments. Chip vendors from both the ARM and x86 sides of ...
6Scan, a Web security startup based in Tel Aviv launched a new service on Tuesday that can scan websites for security issues, such as vulnerabilities and malware infections, and allows the website owners to automatically fix the problems. ...
Tags: Web security, 6Scan, cyber security