China’s Ministry of National Defence on Wednesday denied recent accusations that the nation’s military supports cyber espionage, saying that a security report backing the claims used scientifically flawed evidence. The ...
Tags: China, accusations, cyber espionage
Adobe on Saturday said it would release an emergency patch for two Reader zero-day vulnerabilities this week. Hackers have already been exploiting the bugs using rigged PDF documents sent as email attachments. "Adobe plans to make ...
Tags: Adobe, Windows, viewing software
Apple says it has been hit by hackers who wormed their way into the California company's system but evidently failed to steal any data. The maker of iPhones, iPads, iPods, and Macintosh computers said it is working with law enforcement ...
Tags: APPLE, iPhones, iPads, iPods, Macintosh computers
A report released National Audit Office revealed that the UK IT skills shortage means that Britain could have trouble defending itself from cyber attacks over the next 20 years. The UK was hit by over 40 million cyber attacks in 2011 ...
Tags: National Audit Office, UK, IT industry
Political activists from the Middle East were targeted in attacks that exploited a previously unknown Flash Player vulnerability to install a so-called lawful interception program designed for law enforcement use, security researchers from ...
Tags: Flash Player, Adobe, mergency update
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and probably part of ...
Google chairman Eric Schmidt has labelled China a menace to the internet, complicit in the use of cyber-crime as part of efforts to undermine its corporate and political opponents. The claims are made in his upcoming book, The New Digital ...
Tags: Google, cyber-crime, China, cyber security
The European Commission’s latest cyber security strategy has been slammed by a member of the European Parliament, who accused the strategy of being “incoherent and lacking in focus” on Thursday. The Cyber Security ...
Tags: Politician, EU, Cyber Security Strategy
According to a new data breach report from Verizon, authentication attacks and “hacktivism” will continue to pose a threat to organisations in 2013. The newly released Verizon Data Breach Investigation Report noted that while ...
Tags: Verizon, authentication attacks, hacktivism
A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since 2007, security firm Kaspersky Lab reported this week. The group, called Red October, has been stealing ...
Tags: cyber, espionage network, Eastern Europe
A major cyber-attack that steals encrypted files, believed to have been targeted at embassies, nuclear research centres and energy organisations, has been uncovered by anti-virus software vendor Kaspersky. The company claims that it has ...
Tags: 1
A major cyber-attack that steals encrypted files, believed to have been targeted at embassies, nuclear research centres and energy organisations, has been uncovered by anti-virus software vendor Kaspersky. The company claims that it ...
Tags: cyber attack, software, Kaspersky
Though U.S. officials have consistently blamed Iran for the ongoing stream of distributed denial of service attacks (DDoS) against major U.S. banks, a number of security experts now say that there is not enough evidence to assign the blame ...
Tags: Iran, bank attacks, financial services networks, cyber security
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
Computerworld - Microsoft today patched 12 vulnerabilities in Windows, Office and several server and development products, but as it hinted last week, did not come up with a fix for the Internet Explorer (IE) bug that cyber criminals have ...
Tags: Microsoft, security updates, Windows, cyber criminals