Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. "Today, we identified that a PDF zero-day [vulnerability] ...
Tags: FireEye, remote code, Adobe Reader
Adobe has been forced to investigate reports of a zero-day security flaw in its Reader and Acrobat software that leaves users vulnerable to cyber-attacks. The exploit was discovered by researchers at network security firm FireEye, who ...
Tags: Adobe, zero-day security flaw, Reader and Acrobat software
Security firm FireEye has claimed that a series of targeted malware attacks detected a year ago are almost certainly part of a Chinese campaign to steal industrial secrets from US companies working in the field of UAVs (Unmanned Aerial ...
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
Microsoft on Saturday confirmed that Internet Explorer (IE) 6, 7 and 8 contain an unpatched bug -- or "zero-day" vulnerability -- that is being used by attackers to hijack victims' Windows computers. The company is "working around the ...
Tags: Microsoft, IE, unpatched bug, vulnerability
A new Flame and Stuxnet-related cyber-threat,dubbed Gauss,is targeting users in the Middle East,security researchers have revealed. Gauss is a complex,state-sponsored cyber-espionage toolkit with online banking Trojan functionality not ...
Security researchers have collaborated to take down Grum, the world's third-largest botnet of hijacked computers. The Grum botnet is believed to have been responsible for around 18% of global spam, or 18 billion spam messages a day. ...
Tags: Security Researchers, Grum, hijacked computers, global spam, spam messages
IDG News Service - Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. ...
IDG News Service - One of the world's most active spam botnets -- Grum -- was crippled after two of its command and control (CnC) servers hosted in the Netherlands were taken down, according to researchers from security firm FireEye. ...
Tags: spam botnets, Netherlands, FireEye, security
The UK Police Central e-Crime Unit (PCeU) has arrested three people in connection to using ransomware, which security experts say poses a threat to businesses as well as consumers. Ransomware is malicious software that is inadvertently ...
Tags: Ransomware, software, computer, blackmailers
Advanced malware that evades signature-based detection has increased nearly 400% in the past year, research by security firm FireEye has revealed. Companies are being hit by an average of 643 successful infections a week, according to the ...
Tags: FireEye, cyber attack, firewalls, intrusion prevention systems
The latest Java zero-day vulnerability is already available to users of the Metasploit tool and Blackhole exploit kit, say security researchers. The Java vulnerability allows attackers to use a custom web page to force systems to download ...
Tags: Metasploit tool, custom web, coded Java, security, FireEye
Cybercriminals no longer control one of the world's largest spam botnets, Grum, because all of the servers the botnet relied on for receiving commands were shut down, according to researchers from security firm FireEye. The last Grum ...
Tags: Cybercriminals, spam botnets, Grum, servers
Attackers using two recently-uncovered Java unpatched vulnerabilities, or "zero-days," have quickly expanded their reach by going mainstream, security experts said today. And on Tuesday, Mozilla, maker of Firefox, joined the chorus of ...
Tags: Java, unpatched vulnerabilities, mainstream, security experts
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java