Adobe Systems released fixes on Tuesday for six critical vulnerabilities affecting its Flash multimedia application and AIR runtime, five of which could allow for remote code execution on a system. The updates affect Windows, Macintosh, ...
Tags: Adobe Systems, critical vulnerabilities, Flash multimedia app
Cloud-based security services provider Zscaler has released an implementation for Internet Explorer of the HTTPS Everywhere browser security extension. HTTPS Everywhere forces the browser to always connect over HTTPS(HTTP Secure)to ...
Tags: cloud-based security services, Zscaler, HTTPS Everywhere
Attackers can abuse the way browsers and other applications handle steam:// protocol URLs in order to exploit serious vulnerabilities in the Steam client or games installed through the platform, according to researchers from startup ...
Tags: attackers, browsers, applications, URL, vulnerabilities
The 'CRIME' attack announced last week exploits the data compression scheme used by the TLS (Transport Layer Security) and SPDY protocols to decrypt user authentication cookies from HTTPS (HTTP Secure) traffic, one of the attack's creators ...
Tags: CRIME attack, data compression scheme, TLS, SPDY protocols, HTTPS
Google yesterday patched 24 vulnerabilities in Chrome, and paid out $29,500 in bounties to nine researchers, more than half of that to one of the company’s most prolific bug finders. Chrome 22, which Google started pushing to ...
Tags: Chrome, Glazunov, Google, Google Chrome, Bounty Hunters
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
Mozilla today launched Firefox 15, boasting that users will see "drastic improvements in performance" because of new code that stops add-ons from leaking memory. The open-source developer also patched 31 vulnerabilities, 23 of them dubbed ...
Tags: Mozilla, Firefox 15, new code, leaking memory
Google will pull the plug for Chrome running on OS X 10.5, aka Leopard, after it releases version 21, which is currently in beta and will reach the browser's "stable" channel sometime next month, the company has announced. Chrome 22, the ...
Google co-founder Sergey Brin today played the role of ringmaster in a modern-day circus for the second time at Google I/O as parachutists jumped from an airship to the roof of San Francisco's Moscone Center and bikers jumped and then ...
Tags: Google, Sergey Brin, chrome browser, virtual 3D web site
For mainstream and ultrathin laptops Advanced Micro Devices (AMD) has launched its new A-Series Accelerated Processing Units (APUs) for mainstream and ultrathin notebooks all-in-one PCs, home theater systems and embedded designs. Part ...
The new XE303C12 model Chromebook is powered by Google Chrome OS Samsung Electronics in collaboration with Google has launched its new Chromebook, which is powered by Google Chrome OS. The new Chromebook comes equipped with Samsung ...
Tags: Samsung, Google, Chromebook, display screen
The Cambridge Satchel Company won ‘Fashion & Retail Personnel Smaller Etailer’ at Drapers Fashion Awards 2012 at London's Grosvenor House Hotel. Founder, Julie Deane said, “Drapers is the real fashion industry standard ...
Nearly a quarter of worldwide internet users are still running outdated browsers, creating huge gaps in online security, a study has revealed. Out of a random sample of 10 million customers, security firm Kaspersky found 23% were using ...
Tags: browsers, outdated browsers, online security, Kaspersky, security threats
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. The zero-day ...
Tags: PDF, Cybercriminals, Adobe Reader, Group-IB
IDG News Service-Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages,downloading and executing files,hijacking accounts,bypassing ...
Tags: malware, browser extension, remote-controlled, Balazs