Those using the Ruby on Rails web application framework on their websites are being advised to update the software immediately after multiple new vulnerabilities were found. It's the second time this month that Rails has been patched ...
Tags: Ruby on Rails, web application framework, websites, software
Though U.S. officials have consistently blamed Iran for the ongoing stream of distributed denial of service attacks (DDoS) against major U.S. banks, a number of security experts now say that there is not enough evidence to assign the blame ...
Tags: Iran, bank attacks, financial services networks, cyber security
A study found that at the end of 2012, 51% of secure IT networks were breached from employees using personal devices. While over half of large organisations experienced breaches in security, only 25% of small business experienced the ...
Tags: enterprise networks, personal devices, networks, browser
The developers of Ruby on Rails, a popular open source Web application development framework for the Ruby programming language, released versions 3.2.10, 3.1.9, and 3.0.18 of the software on Wednesday in order to patch a serious SQL ...
Tags: Ruby on Rails, open source Web app, Ruby programming language
Security researchers from antivirus vendor Trend Micro have uncovered a piece of backdoor-type malware that infects Java-based HTTP servers and allows attackers to execute malicious commands on the underlying systems. The threat, known as ...
Tags: security researchers, Trend Micro, Java, HTTP servers, malware
IDG News Service-Different hacker groups claim to have breached servers belonging to ImageShack,Symantec,PayPal and other organizations. On Sunday,a hacker group called HTP claimed to have compromised Web servers,MySQL databases,routers ...
Tags: hackers, ImageShack, Symantec, PayPal
IDG News Service-SAP is working on a number of potential next-generation BI(business intelligence)technologies meant to exploit the company's HANA in-memory database,including a new version of the popular Explorer visualization ...
Tags: internal SAP document, business intelligence technologies, HANA explorer
Computer security conferences tend to be male-dominated affairs. It's not that women aren't present, but just not anywhere near their normal proportional representation in society. To address the disparity, the Power of Community ...
Tags: computer security, POC2012, women, male-dominated, hacking contest
Hoping to capitalize on the excitement around the pending Windows 8 launch, Microsoft has announced this year's dates for its premier developer conference, Build 2012, which will be held Oct. 30 through Nov. 2 on the company's Redmond, ...
Tags: Microsoft, Computer Products, Conference, Redmond
A typical Web application is the target of an attack at least one in three days on average,according to a report released by data security firm Imperva. The third edition of Imperva's semi-annual Web Application Attack ...
IDG News Service - A tool for testing if web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat USA 2010 security conference on Wednesday. The tool and the research ...
Tags: web application firewalls, Black Hat USA 2010, cyber security
A marketplace where security researchers can sell details on software bugs said it was compromised on Tuesday due to an "embarrassing oversight" that left its web server vulnerable. ExploitHub, based in Austin, Texas, has an online ...
Tags: ExploitHub, software, software bugs, web server, SQL database
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
IT Governance Ltd, a leading cybersecurity management service provider, is warning organisations that they are exposed to ever greater risks resulting from new Internet-based threats being launched faster than ever. IT Governance Ltd, a ...
Tags: Web Based Applications, Productivity, Security, Computer Products
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products