MI5 chief Jonathan Evans says the intelligence agency is working against"astonishing"levels of cyber-attacks on UK industry. In his first public speech in two years at London's Mansion House,Evans warned that internet"vulnerabilities"were ...
Tags: MI5, intelligence agency
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE) client. These features will benefit ...
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
IT Governance Ltd, a leading cybersecurity management service provider, is warning organisations that they are exposed to ever greater risks resulting from new Internet-based threats being launched faster than ever. IT Governance Ltd, a ...
Tags: Web Based Applications, Productivity, Security, Computer Products
Microsoft today announced it will deliver seven security updates next week to patch 11 vulnerabilities, including the first that apply to Internet Explorer 10 (IE10), the company's newest browser. As it did last month, Microsoft will also ...
Tags: Microsoft, security updates, vulnerabilities, IE10, Windows 8
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Three widely deployed payment terminals have vulnerabilities that could allow attackers to steal credit card data and PIN numbers, according to a pair of security researchers from penetration testing firm MWR InfoSecurity in the U.K. The ...
Tags: payment terminals, MWR InfoSecurity, credit card data, PIN numbers
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
A US congressional committee has reported that Chinese telecommunications equipment providers Huawei and ZTE pose a security threat to the US, following a year-long investigation. A draft of the report from the House Intelligence ...
Tags: US, security, Huawei, ZTE, investigation
New trends in computing, including social media and cloud computing, are challenging traditional approaches to computer security that will force organisations to adapt – or to risk marginalisation and extinction, according to Gartner ...
Tags: computing, computer security
Google has been dragged into adopting rival Microsoft's Patch Tuesday, fallout from an Adobe move last month. Earlier this week, Google updated its Chrome browser, quashing six bugs and as it often does, also updating Adobe's Flash ...
HERZELIA, ISRAEL, July 12, 2012 /24-7PressRelease/ -- Alentus announced today its partnership with GamaSec, a remote online website security scan service. GamaScan identifies web application vulnerabilities, provides real-time vital ...
Tags: Alentus, GamaSec, online website security scan service
IBM is set to provide free programmes, training courses and resources for IT professionals and educators in a bid to narrow the skills gap. With the mission of preparing students for real-world business challenges, IBM will be offering ...
Tags: IBM, IT, IT security, Knowledge Exchange
Cameleon Software, Europe's leading provider of configure - price - quote - software (CPQ) and product configuration software, announces record quarter with 41% year over year growth. CHICAGO, IL, July 12, 2012 /24-7PressRelease/ -- ...
A security researcher claims that he found 23 vulnerabilities in industrial control software from several vendors after a different security company last week showcased vulnerabilities in applications from some of the same manufacturers, ...
Tags: security researcher, vulnerabilities, industrial control software