A version of MiniDuke, the cyberspy malware aimed at governments and agencies in Europe and elsewhere, has been operating for at least 21 months, internet security firm Bitdefender has discovered. The newly discovered version also raises ...
Tags: MiniDuke, Computer Products
Apple says it has been hit by hackers who wormed their way into the California company's system but evidently failed to steal any data. The maker of iPhones, iPads, iPods, and Macintosh computers said it is working with law enforcement ...
Tags: APPLE, iPhones, iPads, iPods, Macintosh computers
President Barack Obama's cybersecurity executive order, announced during his State of the Union address Tuesday night, elicited guarded praise from several quarters even as it revived calls for more comprehensive bipartisan legislation to ...
A faulty antivirus update issued by Kaspersky Lab on Monday left many of its home and business customers unable to access any websites on their computers. Systems administrators using Kaspersky Endpoint Security (KES) on their corporate ...
US President Barack Obama has finally signed a much-anticipated executive order to protect key elements of the country's critical infrastructure against cyberattacks. Covering power plants, water utilities and other high-profile targets, ...
Tags: cyberattacks, infrastructure, Barack Obama
Nissan Motorsport has unveiled the race colours for its 2013 Nissan Altima V8 Supercars and its four-man driver line-up that will take to the grid at the opening round of the championship in Adelaide in March. Nissan Motorsport racing ...
Tags: Nissan, Altima, V8 Supercars
This year's major malware trend will be the appearance of more Stuxnet and Flame-style ‘cyber weapons', internet security firm AVG's CTO, Yuval Ben-Itzhak, has revealed to Computing. "Stuxnet and Flame have already happened, and ...
Tags: Stuxnet, Flame-Like Malware Attacks, Computer Products
ASN1C is an all-in-one development solution targeted at product developers working with standards based on Abstract Syntax Notation One (ASN.1). Many standards bodies use ASN.1 to define interoperable protocols, in a variety of industries ...
Tags: ASN1C, all-in-one development solution, telecommunication
Google today announced it would again host its Pwnium hacking contest at a March security conference, but boosted the maximum amount it will pay to $3.14 million and changed the target to its browser-based operating system, Chrome OS. ...
Tags: Google, Pwnium hacking contest, operating system, Chrome OS
Microsoft vowed on Wednesday to improve two of its security products after both failed to pass an evaluation by a Germany security software testing organization. The company's Security Essentials and Forefront Endpoint Protection failed ...
Following a failed evaluation by a German software security testing firm, Microsoft vowed on Wednesday to improve two of its security products. The company’s Security Essentials and Forefront Endpoint Protection failed to earn a ...
Microsoft and a respected researcher disagreed this week about whether a bug in Windows RT is actually a security vulnerability that should be patched. The bug, revealed Jan. 5 by a hacker known as "clrokr," can be used to bypass a ...
Tags: Microsoft, bug, Windows RT
WD,a Western Digital company,and a world leader in external storage and solutions for today's connected life,today unveils the new My Net AC1300 HD Dual-Band Router and My Net AC Bridge as the latest additions to the acclaimed My Net family ...
Tags: WD, Western Digital company
Security experts have flagged a zero-day exploit in Oracle's Java software,urging users to disable it to prevent hackers remotely controlling their computers. "Java is a mess.It's not secure,"said James Blasco,labs manager for internet ...
Tags: Java, security expert, hacker, Windows 7
Data eraser for the enterprise gets a makeover Kroll Ontrack, a provider of data recovery, information management and e-disclosure, announced the launch of Ontrack Eraser 4.0, an enterprise data eraser offering. The firm said it has ...
Tags: Kroll Ontrack, data recovery, information management, data eraser