Conventional third party controls are no longer sufficient to cover the ever-expanding attack surface presented by web and mobile applications developed by service vendors and/or commercial software providers. The current third party ...
Tags: Computer Products, software
Kaspersky Lab has revealed research results that show an increase in malware in the Middle East. The data, provided by Kaspersky Security Network, reveals that The UAE had the highest rate of attacks in the region, suffering 34% of all ...
Tags: Computer Products, Kaspersky, software
Critical vulnerabilities in SAProuter, the SAP module used to connect users of the enterprise resource planning (ERP) software with SAP's update services, could be compromising their security, according to Alexander Polyakov, chief ...
Tags: Computer Products, software
Adobe, known for its Reader and Acrobat software, has confirmed that the cyber attack it recently suffered impacted 38 million users - more than 10 times the 2.9 million customers it had said were affected initially. The attack, which the ...
Tags: Adobe, software, Computer Products
The key to a secure bring-your-own-device (BYOD) implementation is to treat staff as security specialists, according to Intel's Rob Evered, the company's senior information security technologist and strategist. "We have got about 60,000 ...
Tags: Computer Products, software
Security expert and reformed hacker Kevin Mitnick has branded anti-virus software useless, claiming: "The only thing McAfee is good at is making videos." Further reading Not enough cyber warriors to fight computer hackers, says former ...
Tags: Computer Products, software, hacker
As anticipated, the latest round of Microsoft’s Patch Tuesday monthly release of security fixes addresses a widely known Internet Explorer (IE) vulnerability already being exploited by malicious hackers. Overall, for October’s ...
Google said Wednesday it plans to reward developers for developing proactive security improvements for some of the most widely used open-source software programs. The program aims to “improve the security of key third-party software ...
Petroleo Brasileiro (Petrobras SA), one of the world's largest oil and gas companies, has emphasised that the tapping of its systems by the US National Security Agency (NSA) is a result of political, and not technical issues. The NSA has ...
Tags: Computer Products, software
SAP is to circumvent any spying by the US National Security Agency (NSA) in Brazil by building data centres in the South American country. In documents aired by Brazil's biggest television network, Globo, the NSA had a presentation dated ...
Tags: Computer Products, software
Oracle added a feature in Java that lets companies control what specific Java applets are allowed to run on their endpoint computers, which could help them better manage Java security risks. The new feature is called the "Deployment Rule ...
Tags: Computer Products, software
Adobe released security updates for Flash Player, Adobe Reader and Shockwave Player on Tuesday to address critical vulnerabilities that could allow attackers to take control of systems running vulnerable versions of those programs. The ...
Tags: Adobe, Flash Player
Android devices are 100 times more likely to contract malware than iOS devices, a report from the US Homeland Security and Department of Justice has stated. The unclassified report, which reveals that 79 per cent of malware threats to ...
Tags: Computer Products, software, Android
Facebook has blamed a misunderstanding for an embarrassing incident last week in which founder Mark Zuckerberg's Timeline was hacked to draw attention to a security flaw a researcher believed was being ignored by firm. As QEDs go, what ...
Tags: Facebook, Computer Products
Cisco Systems has released new security patches for several versions of Unified Communications Manager (UCM) to address vulnerabilities that could allow remote attackers to execute arbitrary commands, modify system data or disrupt services. ...
Tags: Computer Products, software, Electrical, Electronics