updates for its Reader, Acrobat, Flash Player and ColdFusion products on Tuesday to fix many critical vulnerabilities, including one that is already actively exploited by attackers. The Adobe Reader and Acrobat updates include fixes for ...
Tags: Adobe, Computer Products, Security Updates
Microsoft's Internet Explorer 10 (IE10) doubled its usage share last month, and now accounts for nearly 11% of all copies of IE in use, a Web measurement company said today. IE10, which Microsoft launched last October for Windows 8 and in ...
Tags: Microsoft, Internet Explorer 10
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn. The vulnerability, identified as CVE-2013-2423, was ...
Tags: Computer Products, software
Google has announced that it will no longer be basing future releases of its Chrome browser on WebKit, the open-source rendering engine that it shares with Apple's Safari. Instead it will be releasing a fork of WebKit dubbed Blink, which ...
Tags: google, apple, software, Computer Products
iOS continues to lead in the enterprise space as the mobile platform of choice, according to cloud computing vendor, Citrix. In its latest Citrix Enterprise Mobility Cloud report, it claimed that iOS made up 58 percent of all global ...
Tags: iOS, mobile platform, cloud computing
A new version of the TDL rootkit-type malware program downloads and abuses an open-source library called the Chromium Embedded Framework that allows developers to embed the Chromium Web rendering engine inside their own applications, ...
Tags: Malware, Chromium Embedded Framework, system
Two researchers from security firm Imperva have devised new techniques that could allow attackers to extract sensitive information from users' encrypted Web traffic. The new methods build on those used in an attack called CRIME revealed ...
Tags: Computer Products, software
Almost nine out of 10 security flaws discovered on PCs running Windows were due to vulnerable third-party applications rather than pre-installed Microsoft software. That's according to a report by security expert Secunia, which examined ...
Tags: Computer Products, software
Weekly classified magazine Auto Trader's shift to digital-only has been helped by its switch to a TelecityGroup datacentre, according to Tim Jones, the CIO of Trader Media Group (TMG), which owns the title. In an interview with Computing, ...
Tags: Auto Trader, site, internet connectivity
A security researcher has found a loophole in how the HTML5 Web Storage standard is implemented in the Google Chrome, Internet Explorer and Apple Safari browsers that could allow malicious websites to fill visitors' hard disk drives with ...
Tags: loophole, HTML5 Web Storage, security
Internet Explorer's poor reputation for security is undeserved, with Mozilla Firefox actually the most vulnerable internet browser in common usage. That's according to research by network security solutions provider Sourcefire, which ...
With the release of version 7.3 of NetBeans, Oracle has updated the IDE (integrated developer environment) so Java developers can more easily build rich HTML5-based user interfaces for their mobile and Web applications. NetBeans 7.3 ...
Tags: NetBeans, Oracle, mobile, Web applications
Analog semiconductor maker Skyworks Solutions Inc of Woburn, MA, USA, has reported improved results for fiscal first-quarter 2013 (ending 28 December 2012). Revenue was $453.7m, up nearly 8% on last quarter’s $421.1m and 15% on ...
Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan ...
Adobe on Thursday updated Flash Player to patch a pair of zero-day vulnerabilities that hackers were already using to hijack Windows PCs and Macs. The out-of-band, or emergency, update was Flash's first of the year and the first since ...