Microsoft today said it would update Flash on Windows 8 "shortly," although it declined to set a timetable. "In light of Adobe's recently released security updates for its Flash Player, Microsoft is working closely with Adobe to release ...
Android Forums, an online forum for Android users, was the target of a hacker attack that could have led to user information including passwords getting compromised, its operator Phandroid.com said on Thursday. Members of Android Forums ...
Tags: Android Forums, Android users, online forum, hacker attack
With the advent of mobility and the influx of BYOD in enterprise, employers are struggling to keep control of their networks, according to John Yun, Director, Product Marketing, Blue Coat. Yun, who is in Dubai promoting Blue Coat’s ...
Tags: Blue Coat botnets, BYOD, cyber attacks, hackers
A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious consideration. The ...
Tags: Apple, hackers, Keychain data, Mac OS X
Apple has quietly hired Kristin Paget, a former Microsoft security expert who worked as a hacker for the company to resolve Windows Vista vulnerabilities, to work on its Mac OS X security team. According to her LinkedIn profile, Paget ...
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report. The security holes, described in five critical and four important ...
Tags: Microsoft, vulnerabilities, software products, Windows, Office, IE
As many as 300,000 PCs and Macs will drop off the Internet in about 65 hours unless their owners heed last-minute calls to scrub their machines of malware. According to a group of security experts formed to combat DNSChanger, between a ...
Tags: Internet, PCs and Macs, infected computers
An official document containing policies and pledges for customers of Oracle’s cloud services reveals that many aspects fall in line with industry standards, while others may prompt cause for worry among customers, according to ...
Tags: Official Document, Oracle's Cloud
Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, PayPal and other organisations. On Sunday, a hacker group called HTP claimed to have compromised Web servers, MySQL databases, routers and ...
Tags: cyber criminals, cyber security, cybercrime, hack, hackers, highlightedpost
Security company Onapsis released on Wednesday a product that allows intrusion detection systems to recognize attacks against SAP applications holding critical financial and business data. The product, called Onapsis IPS, is a collection ...
Tags: Security company Onapsis, intrusion detection systems, SAP
Ireland top least-malware-infected nations for the first time PandaLabs, Panda Security's antimalware laboratory, today published its Quarterly Report for Q3, analyzing the IT security events and incidents from July through September ...
A security researcher published on Friday another attack on Facebook’s Instagram photo-sharing service that could allow a hacker to seize control of a victim’s account. The attack was developed by Carlos Reventlov around a ...
Tags: Apple, cyber attack, Facebook, Instagram, iPhone, social network
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...
Tags: highlightedpost, Microsoft, Microsoft ERP, Security researchers
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...