Mozilla has released a fix for the latest version of its Firefox browser a day after it was withdrawn due to a security flaw. The non-profit organisation said the vulnerability in Firefox 16 could allow a malicious website to capture web ...
Tags: Mozilla, security flaw
IDG News Service - Researchers from security vendor AlienVault have identified a variant of a recently discovered Internet Explorer exploit that is used to infect targeted computers with the PlugX remote access Trojan (RAT) program. The ...
Tags: IE, malware, Internet Explorer, website
Computerworld - Sprint today denied that subscribers of its Virgin Mobile subsidiary were wide open to account hijacking attacks as claimed by an independent software developer this week. In emailed comments, Sprint spokeswoman Stephanie ...
A new Flame and Stuxnet-related cyber-threat,dubbed Gauss,is targeting users in the Middle East,security researchers have revealed. Gauss is a complex,state-sponsored cyber-espionage toolkit with online banking Trojan functionality not ...
A hacker is selling a$700 zero-day exploit for Yahoo Mail that lets an attacker use a cross-site scripting(XSS)vulnerability to steal cookies and hijack accounts. The hacker,known as"TheHell",created a video to market the exploit on an ...
Tags: hacker, Yahoo mail
If you're watching TV and the channel suddenly changes, you may not have sat on the remote control by accident. Researchers with the security consultancy ReVuln in Malta have found a vulnerability present in most TVs made by Samsung ...
Tags: Samsung, TV, software, malicious software, LED 3D TV
A marketplace where security researchers can sell details on software bugs said it was compromised on Tuesday due to an "embarrassing oversight" that left its web server vulnerable. ExploitHub, based in Austin, Texas, has an online ...
Tags: ExploitHub, software, software bugs, web server, SQL database
IT often virtualises new applications and workloads by default.Virtualisation is now the norm,deploying a physical server the exception.Yet,a third of companies admit they have not invested in security for their virtual computing ...
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE) client. These features will benefit ...
Organizers played "Eye of the Tiger" and "We are the Champions" over the loudspeakers as participants in the SANS Institute's NetWars Tournament of Champions sat down at their laptops and prepared for action. About 200 cybersecurity ...
Tags: SANS Institute, NetWars, Cybersecurity, Peers
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
Popular online social networking site Tumblr was ravaged on Monday by an Internet worm that spewed racist and inflammatory messages across thousands of user accounts. The malicious hacking group known as GNAA claimed responsibility. The ...
Tags: social networking, Tumblr, Internet worm, site attack
Some advertising analytics companies are using a vulnerability in Microsoft's Internet Explorer browser for a questionable edge in figuring out if web users are seeing display advertisements buried within web pages. The flaw, if fixed by ...
Tags: vulnerability, Microsoft, Internet Explorer, browser, ad tracker
Microsoft today announced it will deliver seven security updates next week to patch 11 vulnerabilities, including the first that apply to Internet Explorer 10 (IE10), the company's newest browser. As it did last month, Microsoft will also ...
Tags: Microsoft, security updates, vulnerabilities, IE10, Windows 8
French security firm Intego discovered a new Mac Trojan horse this week that is being used to target specific individuals. The Trojan, dubbed "Crisis" by Intego -- a Mac-only antivirus developer -- and called "Morcut" by Sophos, is ...
Tags: Intego, Mac, Trojan horse, Hacking Toolkit