Mozilla today launched Firefox 15, boasting that users will see "drastic improvements in performance" because of new code that stops add-ons from leaking memory. The open-source developer also patched 31 vulnerabilities, 23 of them dubbed ...
Tags: Mozilla, Firefox 15, new code, leaking memory
Apple has quietly hired Kristin Paget, a former Microsoft security expert who worked as a hacker for the company to resolve Windows Vista vulnerabilities, to work on its Mac OS X security team. According to her LinkedIn profile, Paget ...
Security researchers from antivirus vendor Symantec identified two malware apps on Google Play that used a multistage payload delivery system in order to remain undetected. The apps, which have since been removed by Google, masqueraded as ...
Tags: antivirus vendor Symantec, security researchers, malware apps
Facebook on Tuesday launched a feature that allows users to lock down their Facebook accounts and perform malware scans if they suspect that their computers might be infected. Facebook already uses internal scanners to detect spam and ...
Tags: Facebook, malware, infected computers
Accusations that an Android-based botnet is spewing spam may, in fact, be no such thing, but instead a sign that criminals are exploiting bugs in the Yahoo Mail app for Google's mobile operating system, a security firm said today. ...
Tags: spam, Android, Yahoo Mail app
BitDefender Labs has discovered Android malware that regularly broadcasts the location of the infected mobile device to a remote server. What the malware creators intend to do with the privacy-invading information is not clear. The app ...
Tags: Android malware, infected mobile device, remote server
Attackers can abuse Facebook’s phone search feature to find valid phone numbers and the name of their owners, according to security researchers. The attack is possible because Facebook doesn’t limit the number of phone number ...
Tags: Facebook, highlightedpost, Mark Zuckerberg, Phone number search, privacy
Hackers have compromised two servers used by the FreeBSD Project to build third-party software packages.Anyone who has installed such packages since Sept.19 should completely reinstall their machines,the project's security team warned. ...
Tags: hackers, FreeBSD, third-party software packages, SSH Keys
Facebook has restricted the rate at which users can perform phone number searches on its mobile website in order to block a recently disclosed method of harvesting phone numbers. “The ability to search for a person by phone number ...
Tags: Accounts, Facebook, highlightedpost, Mark Zuckerberg, Passwords, security
A dream tool for hackers capable of cracking nine billion passwords a second can be bought for as little as pound 400, warns hosting firm UKFast. Researchers found a low-spec desktop PC with two readily available, high-power graphics ...
Advanced persistent threats (APTs) are real and all companies should be taking them seriously, says telecommunications company AT&T. In the past year, the company has set up an IT security team dedicated to researching APTs and making ...
VMware has confirmed that the source code for its enterprise-level virtualisation platform – ESX hypervisor – has been leaked online and is urging users to apply security patches. This is the second time the ESX source code ...
Tags: VMware, virtualisation platform, security patches, leaked online
About 200 Android applications hosted on Google Play create spoofed SMS messages on the devices on which they are installed,according to security researchers from antivirus vendor Symantec. This technique can theoretically be used for SMS ...
Tags: Android applications, Google, SMS
EAST CLEVELAND, Ohio — August 9, 2012 — (NYSE:GE) — Since 1892, Aultman has served Canton, Ohio, with exceptional health care services. In 2010, Stark County's largest hospital and employer launched a project to serve ...
Tags: GE, Lighting, LED conversion, Light fixture, LED fixtures
IDG News Service - Security researcher Felix "FX" Lindner has a more compelling reason to steer clear of routers from Huawei Technologies than fears about its ownership. While the company blasted for its opaque relationship with China's ...
Tags: Huawei, ownership, China's government