Mozilla on Tuesday shipped Firefox 20, adding more flexible private browsing and patching 13 vulnerabilities, five rated "critical" by the company's security team. Along with the privacy change, Mozilla also revamped Firefox's download ...
Tags: Firefox, software, Computer Products
Epicor is suing IT service provider Alternative Technology Solutions, claiming the company illegally used its ERP (enterprise resource planning) software in order to develop and sell add-ons and services, in a case that has parallels to ...
Tags: Software, Computer Products
Facebook has patched a serious vulnerability that could have allowed attackers to easily gain access to private user account data and control accounts by tricking users into opening specifically crafted links, a Web application security ...
Tags: Facebook, user account data, company news
Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan ...
For the first time, a major botnet take-down has included direct victim notification that warns users their PCs are infected and shows them how to scrub clean their machines. Yesterday's take-down of the Bamital botnet by Microsoft and ...
Tags: PC, victim notification, Bamital botnet
Software vendors Microsoft and Symantec have "taken down" the Bamital botnet following a joint investigation lasting more than three years. The operation involved shutting down servers that were being used to control hundreds of thousands ...
Tags: Microsoft, Symantec, joint investigation
Financial malware authors are returning to traditional, phishing-like, credential-stealing techniques in order to evade detection, according to researchers from security firm Trusteer. Most financial Trojan programs used by cybercriminals ...
Tags: Financial malware, credential-stealing techniques, detection
Software titan Microsoft and computer security giant Symantec sat they have smashed a hacker-infected computer network that was hijacking internet searches.
Tags: Microsoft, Symantec Smash Cyber Criminal, Computer Products
Google thinks it might have found an answer to the vexing problem of forgotten or weak passwords: "physical" passwords, which might come in the form of a piece of jewelry such as a ring. In a research paper, two of its engineers write ...
Tags: Google, passwords, hijacking, online accounts
Attackers are exploiting a "zero-day" vulnerability in Microsoft's Internet Explorer (IE) and hijacking Windows PCs that cruise to malicious or compromised websites, security experts said Monday. Microsoft confirmed the IE bug, saying, ...
Tags: Hackers, IE, Computer Products
Computerworld - Sprint today denied that subscribers of its Virgin Mobile subsidiary were wide open to account hijacking attacks as claimed by an independent software developer this week. In emailed comments, Sprint spokeswoman Stephanie ...
Twitter has restricted the ability of attackers to post tweets and perform other actions on behalf of many users who have phone numbers associated with their accounts, but some users need to enable a PIN option in order to be protected. ...
Tags: Twitter, attackers, phone numbers, PIN option, SMS
Millions of subscribers to Virgin Mobile's services in the United States are wide open to account hijacking because of the insecure manner in which the company authenticates users to their online accounts, an independent software developer ...
Tags: subscribers, Virgin Mobile's services, account hijacking, online accounts
Several malicious Android apps designed to steal mobile transaction authentication numbers (mTANs) sent by banks to their customers over SMS (Short Message Service) were found on Google Play by researchers from antivirus vendor Kaspersky ...
Tags: Computer Products, Apps, SMS, Google Play
Disruption is the best way of tackling botnet-based cybercrime, according to Microsoft's Digital Crimes Unit (DCU). Taking down the Waledac botnet of hijacked computers in February 2010 was a proof-of-concept strategy that Microsoft and ...
Tags: Disruption, cybercrime, Microsoft, DCU