The US Federal Trade Commission said HTC agreed "to develop and release software patches to fix vulnerabilities found in millions of HTC devices." No financial penalty against the company was announced. The FTC said it investigated ...
Tags: HTC, HTC Devices, software
iOS 6.1 patches more than two-dozen security vulnerabilities and adds three-dozen LTE carriers to the supported list for the iPhone 5. Computerworld - Apple today released iOS 6.1, the first major update for the mobile operating system ...
Tags: Apple, 4G Carriers, Electronics
Even after Oracle patched critical Java vulnerabilities on Monday, the U.S. Computer Emergency Readiness Team (US-CERT) continued urging users to disable Java browser plug-ins. "Due to the number and severity of this and prior Java ...
Software engineers working for the US military will have to follow new testing procedures to reduce the risk of security flaws in their code. That is one of a number of computer security-related measures contained in the 2013 National ...
Tags: Software, US Military, Legal Checks
Criminals no longer need to stake out a home or a business to monitor the inhabitants'comings and goings.Now they can simply pick up wireless signals broadcast by the building's utility meters. In the US,analogue meters that measure ...
Tags: Wireless Meters, Criminals
Network World-A researcher at North Carolina State University has uncovered a vulnerability that could be exploited to send deceptive text messages from some Android devices,as part of a phishing scheme. MORE ON ANDROID:Hottest Android ...
Tags: Android SMS, vulnerability, phishing scheme
Computerworld - Google yesterday boosted payments to researchers for reporting bugs in Chrome, saying the move was prompted by a decline in vulnerabilities submitted by outsiders. "Recently, we've seen a significant drop-off in externally ...
Tags: Google, bugs in Chrome, brower, company news
DENVER, CO, July 28, 2012 /24-7PressRelease/ -- Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or ...
Tags: Computer hackers, computer systems, computer security, Software, iComputer
Hacking group Anonymous claims to have released a set of more than 1 million Apple Unique Device Identifiers (UDIDs) obtained from breaching the FBI. The group indicated that the action was part of is AntiSec (Anti Security) campaign to ...
Tags: FBI, Apple, Anti Security, security flaws
International escrow and assurance services provider NCC Group is to acquire US-based Matasano Security in £8.4m deal. Matasano is a US security testing services provider with numerous blue chip clients particularly in software, IT, ...
Huawei Technologies said on Thursday it was verifying claims that its routers contained critical vulnerabilities, after security researchers disclosed alleged problems last weekend. "We are aware of the media reports on security ...
Tags: Huawei Technologies, routers, critical vulnerabilities, security
Major high street banks are planning to impose new terms and conditions on customers that would make them squarely responsible for credit and debit card fraud. Further reading Seven-year glitch earns Bank of Scotland 4.2m fine Banks' IT ...
Tags: high street banks, finance, software, computing
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android, applications, critical, devices, vulnerabilities
Mozilla will drop support for Apple's OS X 10.5, or Leopard, after it ships Firefox 16 in October, according to company developers. "We are not planning to support Mac OS X 10.5 with Firefox 17," said Josh Aas, who works on the Firefox ...
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android device, security flaws, malicious applications