Mozilla is taking steps to limit the risk of powerful subordinate Certificate Authority (CA) certificates falling into the hands of attackers and potentially being used to issue rogue certificates for use in SSL snooping attacks. The ...
Tags: Mozilla, browser maker, browser
A TV report into the lives of migrant workers employed at Amazon.com distribution centers in Germany has prompted the government to call for an investigation, and is pushing other companies to change their practices. German TV channel ARD ...
Tags: Amazon contractor, labor practices, Amazon
Apple says it has been hit by hackers who wormed their way into the California company's system but evidently failed to steal any data. The maker of iPhones, iPads, iPods, and Macintosh computers said it is working with law enforcement ...
Tags: APPLE, iPhones, iPads, iPods, Macintosh computers
A report released National Audit Office revealed that the UK IT skills shortage means that Britain could have trouble defending itself from cyber attacks over the next 20 years. The UK was hit by over 40 million cyber attacks in 2011 ...
Tags: National Audit Office, UK, IT industry
Cyber attacks in the UK cost the country up to 27bn each year. A report by the National Audit Office warned that the IT skills shortage in Britain could make it vulnerable against cyber attacks for the next 20 years. The UK suffered ...
Tags: UK, Cyber attacks, cyber security
Several Certificate Authorities (CAs) have formed an advocacy group called the Certificate Authority Security Council (CASC), which will focus on promoting new security standards, policies and best practices for SSL (Secure Sockets Layer) ...
Tags: CAs, web security, SSL deployment
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at ...
Tags: Adobe Reader, anti-exploitation protection, Adobe Reader Sandbox
Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan ...
A critical buffer overflow vulnerability patched this week in the widely used open-source cURL library (libcurl) has the potential to expose a large number of applications and systems to remote code execution attacks. CURL is a ...
Tags: buffer overflow vulnerability, remote code execution attacks, protocols
There is a lot yet to be told about how going private will change Dell, but one thing it won't change is its enterprise strategy. With its $24.4 billion buyout, Dell's enterprise strategy "does not change," Jess Blackburn, a spokesman for ...
Tags: Dell, enterprise strategy, company news
Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended ...
Tags: Barracuda Networks, security issue, network security appliances
The developers of many SSL libraries are releasing patches for a vulnerability that could potentially be exploited to recover plaintext information, such as browser authentication cookies, from encrypted communications. The patching ...
A Russian man accused of being a key figure behind the notorious and hugely successful Reveton “police ransom” malware, which has successfully blackmailed thousands of PC users across the world, has been arrested in Dubai, ...
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and probably part of ...
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. "Today, we identified that a PDF zero-day [vulnerability] ...
Tags: FireEye, remote code, Adobe Reader