Adobe plans in February to close a dangerous hole in its Shockwave application that causes the application to be downgraded when a user launches older multimedia content, allowing hackers to target years-old vulnerabilities. The U.S. ...
Tags: Adobe, 2-Year-Old Shockwave, software
Java 6 will be retired from security support in less than two months, and users and businesses should prepare now for its demise, experts said today. Oracle will publicly patch Java 6 for the last time on Feb. 19, 2013. After that ...
Germany's cybersecurity agency on Monday urged users to drop Internet Explorer (IE) and switch to a rival, like Chrome or Firefox, until Microsoft patches a new critical bug in its browser. In an alert released Monday, Germany's Federal ...
Tags: Germany, cybersecurity agency, IE, users
Adobe today issued a surprise update for Flash Player that patched 25 critical vulnerabilities in the ubiquitous media software. The California company urged Windows users to apply the update in the next 72 hours after rating the fix as ...
Tags: Adobe, Flash Player, Microsoft, IE10 Flash Patching, Google
Microsoft today announced it will deliver seven security updates, one critical, to patch 20 vulnerabilities in Office, SharePoint Server, SQL Server, Windows and other parts of its product lineup. "It looks like an Office month," said ...
Tags: Microsoft, security updates, vulnerabilities, Office, SharePoint Server
Outlook.com, the new webmail service that Microsoft is previewing and that will replace Hotmail, has gained security boosts against phishing and spam. The new safety features come via support for the DMARC email authentication standard ...
IBM and Oracle revealed more details this week about new RISC chips they’re building for server customers, the Power7+ in the case of IBM and the T5 for Oracle. The Unix server market continues to contract as x86-based systems gain ...
Tags: Chip servers, DRAM, IBM, Oracle, Unix servers
PRIVATE WiFi, an innovative company in the security software market, now offers site seals so that websites can let their users know that they are concerned with data privacy and online security. PRIVATE WiFi's site seals add a badge of ...
Tags: PRIVATE WiFi, security software market, data privacy, online security
A "huge loophole" is being carved in the European Union's upcoming data protection regulation, according Ross Anderson, a professor of security engineering at the University of Cambridge in England. The way the current draft of the law ...
Tags: European Union, huge loophole, data protection regulation
Microsoft yesterday warned Windows users of possible "man-in-the-middle" attacks able to steal passwords for some wireless networks and VPNs, or virtual private networks. It won't issue a security update for the problem, however. The ...
Tags: Microsoft, Windows users, attacks, passwords, wireless networks, VPNs
A gear logo proposed to represent and easily identify open-source hardware has caught the eyes of the The Open Source Initiative, which believes the logo infringes its trademark. The gear logo is backed by the Open Source Hardware ...
Tags: gear logo, hardware, The Open Source Initiative, trademark
A novel technique based on MapReduce could let hackers hijack computing resources used by cloud-based mobile browsers and use them anonymously, according to security researchers from North Carolina State University and the University of ...
Tags: cloud computing, Mobile browser hack, mobile device threat, smartphone
A federal judge has rejected BancorpSouth's plan to use contractual agreements with customers as a shield against liability claims stemming from an online heist of some $440,000 that was illegally wire-transferred from the account of one of ...
Tags: federal judge, BancorpSouth, online heist
The U.S. Air Force is openly soliciting technologies that would improve its capability of launching cyberattacks and gathering intelligence during cyberwarfare operations. "The Air Force Life Cycle Management Center invites concept papers ...
Tags: U.S., Air Force, soliciting technologies, cyberwarfare capabilities
4t Networks is pleased to announce that the Cloud hosting provider now additionally offers easy-to-use, customizable Disaster Recovery services, so that your business will be protected with a viable plan when disaster strikes. 4t ...