Microsoft has patched 20 vulnerabilities in Word, Office, Windows, SharePoint Server, SQL Server and other products in its portfolio, including a critical bug in the company’s popular Word programme and another already used to attack ...
Tags: Bugs, Microsoft, Patches, Steve Ballmer, Trojan, vulnerabilities
The number of consumer smartphone and tablets brought into workplaces will more than double by 2014, according to a recent study, but security on the endpoints is lacking. Juniper Research claims the number of devices being used in the ...
Tags: BYOD devices, smartphone, tablets, mobile devices
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. The zero-day ...
Tags: PDF, Cybercriminals, Adobe Reader, Group-IB
CSO-In Windows 8,Microsoft has greatly improved the operating system's ability to detect malware before it has a chance to run,experts say.Windows 8 should also make it more difficult for people to unknowingly install malware in the first ...
UK targeted attacks have gone from four a year to 500 a day in just two years, according to Misha Glenny, security author and journalist. "But it is not just big corporations that are being targeted, attackers are going after everyone in ...
Tags: RSA Europe, Supply Chain, Misha Glenny, London conference
Security researchers have discovered a new vulnerability in all supported versions of Oracle Java that enables attackers to bypass sandbox defences. The vulnerability, which affects Java Standard Edition versions 5, 6 and 7, can be used ...
Tags: Java Flaw, Bypass Sandbox, vulnerability, Security Explorations
"The number of fronts of risk and war, as some people call it, are definitely multiplying," says Clinton McFadden, senior operations manager for IBM X-Force research and development, which just released the results of its X-Force 2012 ...
Tags: Cyberwarfare, Trend and Risk Report., IBM, US
Microsoft says it is investigating reports of a vulnerability in Internet Explorer 6,7,8,and 9 as well as targeted attacks that have attempted to exploit the vulnerability. The zero-day flaw,which does not affect Explorer 10,was ...
Tags: Microsoft Investigates, IE ZeroDay Flaw, targeted attacks
Many big companies are failing to learn from information security incidents, according to Rob Kraus, director of research at malware analysis firm Solutionary. Few organisations are conducting post-incident reviews to see how and why the ...
Tags: information security, Cyber Attacks, 2012(ISC)2 Security Congress
Online cyber criminal markets are putting very sophisticated attack tools into the hands of more low-level attackers, say cyber intelligence specialists. More attackers are now getting their hands on tools like Zeus and SpyEye, according ...
Tags: Online cyber criminal, sophisticated attack tools, Cyber Attack Tools
More than two-fifths of companies worldwide have failed to prepare for cyber threats, a survey from security company Kaspersky Lab has revealed. Some 41% of more than 3,300 IT professionals polled in 22 countries – including 200 in ...
Tags: cyber threats, Kaspersky, online attacks
Computerworld-Oracle today issued an emergency update to patch the critical vulnerabilities hackers have been using in increasing numbers to hijack Windows PCs. According to Rapid7,the security firm that maintains the Metasploit ...
Tags: Oracle, patch, hackers, hijack Windows PCs
Security researchers have spotted a new Java vulnerability in the wild for which there is no security patch as yet. The Java vulnerability, which is being used forC, allows attackers to use a custom web page to force systems to download ...
Tags: Security researchers, Java vulnerability, security patch
Cybersecurity researchers have uncovered a new threat targeting infrastructure in the energy sector that is believed to have hit at least one organisation. The malware, dubbed Shamoon, corrupts files on a compromised computer and ...
Tags: threat targeting infrastructure, computer security, computer attack
Cybercriminals have found a way to circumvent the multifactor authentication systems used to protect business VPNs,according to security firm Trusteer,which has reported a recent targeted attack on an airport network using this method. ...
Tags: Cybercriminals, VPN, Trusteer, security, OTP, authentication system, Citadel