Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. "Today, we identified that a PDF zero-day [vulnerability] ...
Tags: FireEye, remote code, Adobe Reader
Adobe released security updates for Flash Player and Shockwave Player on Tuesday in order to address a total of 19 vulnerabilities affecting the two products. New stand-alone versions of Flash Player 11 were released for Windows, Mac, ...
Tags: Adobe, Flash Player, Shockwave Player
System administrators overseeing Microsoft Exchange deployments should take a close look at Microsoft's latest round of security patches. In addition to covering Windows and Internet Explorer, Microsoft's latest monthly batch of patches ...
A new exploit kit called Whitehole has emerged on the underground market, providing cybercriminals with one more tool to infect computers with malware over the Web, security researchers from antivirus vendor Trend Micro reported Wednesday. ...
Tags: Whitehole, underground market, malware, antivirus software
Adobe has released an emergency patch to fix at least two zero-day vulnerabilities being used to install malware in its Flash Player software that could allow attackers to control affected systems. Hackers had exploited security loopholes ...
Adobe has been forced to investigate reports of a zero-day security flaw in its Reader and Acrobat software that leaves users vulnerable to cyber-attacks. The exploit was discovered by researchers at network security firm FireEye, who ...
Tags: Adobe, zero-day security flaw, Reader and Acrobat software
Adobe on Tuesday released security patches for both Flash Player and Shockwave Player, addressing a total of 19 vulnerabilities affecting the two products. New stand-alone versions of Flash Player 11 were released for Windows, Mac, Linux ...
Tags: Adobe, security patches, Flash Player, Shockwave Player
Adobe updated Flash Player on Thursday in order to patch a pair of zero-day vulnerabilities that hackers have reportedly been using to hijack Windows PCs and Macs. The out-of-band, or emergency, update was Flash’s first of the year ...
Tags: Adobe, Flash Player, vulnerabilities
Office 365 Home Premium for Windows 8 brings with it massive change, possibly the biggest since Office 2003. But the change is not so much about adding Windows 8 touchscreen capability to Office. Sure, it's there, but Office 365HP is ...
Tags: Microsoft Office, Microsoft, notebooks, tablets
Office 365 Home Premium for Windows 8 brings with it massive change, possibly the biggest since Office 2003. But the change is not so much about adding Windows 8 touchscreen capability to Office. Sure, it's there, but Office 365HP is ...
The Los Angeles Post Production Group (LAPPG), one of the leading post-production professional organizations and networking groups in the entertainment industry, has just partnered with MelroseMAC to offer the finest retail and professional ...
Tags: post-production, MelroseMAC, networking
Versions 2.0.5 and earlier of the popular VLC media player software contain a critical vulnerability that can be potentially exploited by attackers to execute malicious code on computers. The vulnerability is located in the VLC component ...
Tags: VLC media player software, vulnerability, malicious code
More than 2 million people and 30,000 animals are expected at Reliant Park for the 2013 Houston Livestock Show and Rodeo in February and March. Behind the scenes, Cat Lift Trucks will provide the equipment and expertise, including more than ...
Tags: Cat Lift Trucks, equipment, expertise
Mozilla yesterday announced it would automatically disable all plug-ins in Firefox except the latest version of Adobe's Flash Player, citing security and stability reasons for the move. The feature, called "click-to-play," has been part ...
Google today announced it would again host its Pwnium hacking contest at a March security conference, but boosted the maximum amount it will pay to $3.14 million and changed the target to its browser-based operating system, Chrome OS. ...
Tags: Google, Pwnium hacking contest, operating system, Chrome OS