Oracle has changed the numbering of its Java security updates, prompting one expert to say, "As if Java updates weren't confusing already." The changes were posted in an Oracle support document last week. "Limited Update releases will ...
Tags: Oracle, Java Patch Updates
Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts. The Pushdo Trojan program dates back to early ...
Tags: Pushdo Botnet, Takedown Attempts
Mozilla on Tuesday released Firefox 21, adding more social media connections, tweaking the Do Not Track privacy setting and rolling out a new tool that long term, aims to create a self-healing browser. The open-source developer also ...
Tags: Mozilla, Computer Products
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks. Over 150,000 computers, ...
updates for its Reader, Acrobat, Flash Player and ColdFusion products on Tuesday to fix many critical vulnerabilities, including one that is already actively exploited by attackers. The Adobe Reader and Acrobat updates include fixes for ...
Tags: Adobe, Computer Products, Security Updates
Alberto Yusi Lajud Pena, found dead in the Dominican Republic two weeks ago, was the leader of the New York cell of an international gang of cyber thieves that authorities allege stole a staggering $45 million from ATM machines around the ...
Tags: Bank Security, Computer Products
Corporate IT departments will be faced with a "mega patch" Tuesday from Microsoft today. The patches to Microsoft's various Windows operating systems and essential applications will patch a number of flaws that are already being exploited ...
Tags: Microsoft, Mega Patch
Microsoft today said it will issue 10 security updates next week, two rated "critical," to patch 33 vulnerabilities, including the zero-day bug that has been used by cyber criminals to poison "watering hole" websites in attacks aimed at ...
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation. Hundreds of organizations across Australia are using out-of-date industrial control systems (ICS) to control the ...
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers. The vulnerability is identified as CVE-2013-3336 and ...
Tags: Adobe, ColdFusion
Urgent action is needed to reduce the U.S. military's dangerous dependence on foreign suppliers for the raw materials, parts and finished products needed to defend America, according to a new study prepared by Brigadier General John Adams ...
Tags: Packaging, Printing, Supply Chain
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that ...
Tags: Web software, software, Computer Products
Hackers could have turned up the heat in one of Google's offices in Sydney. Literally. Computer security researchers with Cylance found that Google's Australia branch was using an unpatched version of Niagara, a software system used for ...
Tags: Google, Cooling System
Microsoft late Friday confirmed that a "zero-day," or unpatched, vulnerability exists in Internet Explorer 8 (IE8), the company's most popular browser. According to multiple security firms, the vulnerability has been used in active ...
D-Link has published beta patches for vulnerabilities in the firmware of many of its IP surveillance cameras, which could allow a hacker to intercept a video stream. The company said on its support forum that it will publish a full ...
Tags: D-Link, Beta Patches, IP Camera