Google yesterday patched 24 vulnerabilities in Chrome, and paid out $29,500 in bounties to nine researchers, more than half of that to one of the company’s most prolific bug finders. Chrome 22, which Google started pushing to ...
Tags: Chrome, Glazunov, Google, Google Chrome, Bounty Hunters
IDG News Service - Brand-new laptop and desktop computers sold in China contain preinstalled malicious software, which has infected millions of computers around the world, according to an investigation by Microsoft revealed on Thursday. ...
IDG News Service - Some of the distributed denial-of-service (DDoS) attacks that targeted the websites of U.S. financial institutions this week have peaked at 60 Gbps, according to researchers from DDoS mitigation provider Arbor Networks. ...
Tags: Ddos, Banks, Computer Products, U.S.Banks
The Internet Archive, a non-profit project established to act as an online library of that preserves digital information, has to date offered up nearly a petabyte of content via the BitTorrent file-sharing site. In a blog post, The ...
Tags: Internet Archive, project, online library, digital information
Facebook is moving to fix one of its biggest problems - finding ways to make money from its growing base of mobile users. The social network Wednesday said that it's trying out a new mobile ad system and is calling on Facebook app ...
Tags: Facebook, mobile users, social network, Facebook app
Google has begun testing a search feature that mines relevant emails from users' Gmail accounts and displays links to them in the results page. To use the feature, users would need to be logged in to their Google account and the Gmail ...
Tags: Google, search feature, relevant emails, Gmail accounts
The news-sharing website Digg will be acquired by technology investment firm Betaworks, according to blog posts put out by both companies. Betaworks paid $500,000 for the social media pioneer that once secured $45 million in financial ...
The Digital Archery contest, devised by ICANN to determine which gTLD applications would be handled first, was canceled on Thursday, the chair of the gTLD Program Committee announced during the ICANN 44 summit in Prague. No alternative was ...
Tags: ICANN, Digital Archery contest, gTLD applications, immediate alternative
Apple apparently made the right decision to omit NFC from the iPhone 5, given that 68% of U.S. consumers prefer to buy good using cash and credit cards over mobile wallets, according to a recent consumer survey. “Consumers ...
Tags: iphone 5, mobile, NFC, survey, smartphone
There will be no certified implementations of Adobe Systems' Flash Player for Android 4.1, and on Aug. 15 the player will take a bow and no longer be available for download from Google's app store Play, Adobe said in blog post Thursday. ...
Tags: Adobe, Flash Player, Android 4.1, Google's app store Play
Microsoft has launched Bing Fund, an angel fund with an incubator program that will make Microsoft resources available to startups and potentially provide it with acquisition targets in the future, Microsoft said in a blog post Thursday. ...
Tags: Microsoft, Bing Fund, angel fund, incubator program
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
Mozilla today launched Firefox 15, boasting that users will see "drastic improvements in performance" because of new code that stops add-ons from leaking memory. The open-source developer also patched 31 vulnerabilities, 23 of them dubbed ...
Tags: Mozilla, Firefox 15, new code, leaking memory
A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious consideration. The ...
Tags: Apple, hackers, Keychain data, Mac OS X
Attacks targeting an unpatched vulnerability in the latest versions of Java 7 have become widespread after an exploit for the new flaw was integrated into the popular Blackhole attack toolkit, according to security researchers from ...
Tags: Java 7, unpatched vulnerability, attacks, exploit for flaw