A Russian man accused of being a key figure behind the notorious and hugely successful Reveton “police ransom” malware, which has successfully blackmailed thousands of PC users across the world, has been arrested in Dubai, ...
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and probably part of ...
Adobe has released an emergency patch to fix at least two zero-day vulnerabilities being used to install malware in its Flash Player software that could allow attackers to control affected systems. Hackers had exploited security loopholes ...
Adobe updated Flash Player on Thursday in order to patch a pair of zero-day vulnerabilities that hackers have reportedly been using to hijack Windows PCs and Macs. The out-of-band, or emergency, update was Flash’s first of the year ...
Tags: Adobe, Flash Player, vulnerabilities
A String of cyber attacks on major US media outlets has intensified worries over Chinese hackers, who analysts say are probably linked to the secretive Beijing government. The attacks, part of a series of incidents traced to Chinese ...
Tags: Hacking Incidents, Fears, China
Enterprise security managers have yet another worry to add to their list: cyberwarfare attacks. Now, in addition to guarding against targeted attacks from cybercriminals and activists, enterprise security managers must increasingly guard ...
Cyber criminals have moved beyond the traditional PC, targeting Android, social media and even the Mac OS X with new attacks, according to Trend Micro’s 2012 Annual Roundup and Mobile Security reports. Malware targeting Android alone ...
Tags: cyber criminals, traditional PC, Android, social media
Unidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world as part of a newly uncovered cyberespionage campaign that started nearly six years ago. ...
Tags: attackers, sensitive information, cyberespionage campaign
A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since 2007, security firm Kaspersky Lab reported this week. The group, called Red October, has been stealing ...
Tags: cyber, espionage network, Eastern Europe
For all the apocalyptic prognostications, 2012 turned out to be a relatively uneventful year from an information security standpoint. A cyber Pearl Harbor did not happen. Stuxnet and its kin did not take out any power grids or shut down ...
Tags: apocalyptic prognostications, 2012, information security, cyber
Microsoft on Saturday confirmed that Internet Explorer (IE) 6, 7 and 8 contain an unpatched bug -- or "zero-day" vulnerability -- that is being used by attackers to hijack victims' Windows computers. The company is "working around the ...
Tags: Microsoft, IE, unpatched bug, vulnerability
Microsoft has responded to public reports of a zero-day vulnerability in Internet Explorer (IE) 6, 7 and 8, suggesting temporary measures to help users to mitigate the issue. The vulnerability could allow a remote attacker to hack into a ...
Tags: Microsoft, vulnerability, IE, users
Attackers are exploiting a "zero-day" vulnerability in Microsoft's Internet Explorer (IE) and hijacking Windows PCs that cruise to malicious or compromised websites, security experts said Monday. Microsoft confirmed the IE bug, saying, ...
Tags: Hackers, IE, Computer Products
Computerworld - An elite hacker group targeting defense industry sub-contractors has an inexhaustible supply of zero-days, or vulnerabilities that have yet to be publicized, much less patched, Symantec said today. In a blog post, the ...
Tags: Elite hacker gang, zero day bugs, Google, hackers, zero day
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security