A suspected Iran-based hacking group known for defacing websites has shown increased ambition over the past few months, targeting U.S. defence contractors and Iranian dissidents, according to a new report from security company FireEye. ...
Tags: Computer Products, IT
One developer's posting this week about Chrome has drawn a bunch of headlines from tech sites launching into reports on the developer's headline post: "Chrome Bugs Allow Sites to Listen to Your Private Conversations." Tal Ater, who ...
Tags: Consumer Electronics, Electronics
Israeli researchers at Ben-Gurion University of the Negev (BGU) said a security flaw was discovered by a team member, a PhD student, and that this vulnerability could enable interception of data on Samsung mobile devices based on the Knox ...
There is no cyber security skills gap, according to the head of business continuity and information security at The Economist, Vicki Gavin. A National Audit Office (NAO) report earlier this year said that it could take 20 years to address ...
Tags: Computer Products, software
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
Google said Wednesday it plans to reward developers for developing proactive security improvements for some of the most widely used open-source software programs. The program aims to “improve the security of key third-party software ...
Rapid 7 this week unveiled a new set of tools designed to help businesses better judge the overall effectiveness of existing security controls and the risk associated with users across the organization. The announcement came during ...
Tags: Rapid 7, software, Computer Products
Facebook has blamed a misunderstanding for an embarrassing incident last week in which founder Mark Zuckerberg's Timeline was hacked to draw attention to a security flaw a researcher believed was being ignored by firm. As QEDs go, what ...
Tags: Facebook, Computer Products
Facebook's "Bug Bounty" programme has paid out $1m in total to users-turned-security-bug-hunters in the past two years, with the youngest recipient being a 13-year-old boy. The largest single "bounty" has been $20,000, and two recipients ...
Tags: Facebook, Amateur Security Testing
Distributed denial-of-service (DDoS) attacks that could be related have in the past few days slammed the DNS servers of at least three providers of domain name management and DNS hosting services. DNSimple, easyDNS and TPP Wholesale all ...
Tags: DDoS Attacks, DNS
Much-hacked social networking site Twitter has finally introduced two-factor authentication in a bid to cut down on the hijacking of accounts. The move follows a string of hacks of high-profile accounts by groups such as the ...
Tags: Twitter, Authentication, Google, Facebook
Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process. The system, called Login Verification, gives users the option to have a verification code sent to their mobile phone ...
Tags: Twitter, Sign-in, Computer Products
Google today upgraded Chrome to version 27, touting it as 5% faster as it patched 13 vulnerabilities. The upgrade was the first since March 26, when Google plumped Chrome 26 into the release channel, the most polished of its three public ...
Tags: Google, Chrome, Computer Products
Mozilla on Tuesday released Firefox 21, adding more social media connections, tweaking the Do Not Track privacy setting and rolling out a new tool that long term, aims to create a self-healing browser. The open-source developer also ...
Tags: Mozilla, Computer Products
For a few months earlier this year, the personal data of customers of the Schnucks supermarket chain was exposed to hackers whose work went undetected until after a card processing company issued an alert about fraudulent activity on a ...
Tags: Hackers, Computer Products