Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. "Today, we identified that a PDF zero-day [vulnerability] ...
Tags: FireEye, remote code, Adobe Reader
In today's fast-moving business environment, success often means getting ahead of the competition and staying there. Not an easy task, considering the pace of technological advances. Here's some help. In addition to ideas showcased by the ...
UK-based Intelligent Packaging Solutions(IPS) has launched a new tamper evident packaging called TE-cap designed for the ice cream market. TE-cap comes with a paper pot and a deep-freeze grade polypropylene lid, which offers a tamper ...
Tags: Intelligent Packaging Solutions, New Packaging, Ice Cream Market
Huawei Technologies said on Thursday it was verifying claims that its routers contained critical vulnerabilities, after security researchers disclosed alleged problems last weekend. "We are aware of the media reports on security ...
Tags: Huawei Technologies, routers, critical vulnerabilities, security
Computerworld-Microsoft today patched a dozen vulnerabilities in Internet Explorer(IE),Windows,Word and Exchange,fixing flaws in the new IE10 for the first time and crushing bugs in Windows 8 and Windows RT for the second month running. ...
Tags: Internet Explorer, dozen vulnerabilities, Windows 8, IE10
Avery Dennison has unveiled a new anti-counterfeiting technology, Sharp Tear that enables existing serial numbers to be read directly through the label. The new technology with thin and clear co-extruded film will provide an extra layer ...
Tags: Avery Dennison, new anti-counterfeiting technology, Sharp Tear
Avery Dennison has launched a new anti-counterfeiting technology Sharp Tear that provides an extra layer of product security for pharmaceutical brands and enables existing serial numbers to be read directly through the label. According to ...
Tags: Avery Dennison, product security, pharmaceutical brands
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. The zero-day ...
Tags: PDF, Cybercriminals, Adobe Reader, Group-IB
IDG News Service - Security researcher Felix "FX" Lindner has a more compelling reason to steer clear of routers from Huawei Technologies than fears about its ownership. While the company blasted for its opaque relationship with China's ...
Tags: Huawei, ownership, China's government
Businesses need to understand the critical importance of secure software development in defending against hackers. "Businesses need to look at their reliance on software and consider the importance of secure development to their ...
Tags: software, secure software, Microsoft, Security Development Conference
Supplied by RPC Containers Blackburn, the Thor pot is, according to RPC, “a microwaveable, tamper-evident food pot solution with proven functional benefits matched by strong aesthetics.” Its robust design and wide opening ensure ...
Tags: market view
For the past few years, U.S food industry suffered countless violations in food security that resulted to recalls and food alerts. Food breaches didn't only hurt the Consumers but it had given great impact on manufacturers and retail market ...
Tags: learning center, Packaging Machine