Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report. The security holes, described in five critical and four important ...
Tags: Microsoft, vulnerabilities, software products, Windows, Office, IE
Microsoft has uncovered a vulnerability in the PC supply chain that allows hackers to pre-install malware-infected copies of Windows onto new machines. As a result, the company has received approval from a federal court to strangle a ...
Tags: Microsoft, PC, surgical sinkhole
Microsoft on Monday issued a security advisory that confirmed in-the-wild attacks are exploiting an unpatched bug in Internet Explorer. The software maker is working on a fix. The advisory addressed the “zero-day” ...
Tags: ie bug, Internet Explorer, Microsoft, patch, security
The Democratic Party embraced its version of Internet freedom and called for new cybersecurity legislation in its platform released as the party begins its convention in Charlotte. The Democratic platform, released late Monday, calls for ...
Tags: Democratic Party, Internet freedom, cybersecurity legislation
BitDefender Labs has discovered Android malware that regularly broadcasts the location of the infected mobile device to a remote server. What the malware creators intend to do with the privacy-invading information is not clear. The app ...
Tags: Android malware, infected mobile device, remote server
Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, PayPal and other organisations. On Sunday, a hacker group called HTP claimed to have compromised Web servers, MySQL databases, routers and ...
Tags: cyber criminals, cyber security, cybercrime, hack, hackers, highlightedpost
Security company Onapsis released on Wednesday a product that allows intrusion detection systems to recognize attacks against SAP applications holding critical financial and business data. The product, called Onapsis IPS, is a collection ...
Tags: Security company Onapsis, intrusion detection systems, SAP
CEO of the Security-as-a-Service leading firm CloudAccess Kevin Nikkhoo was recognized for his paradigm-challenging career accomplishments and personal contributions by Cloud Silver Lining. In recognition of a forward-thinking career, ...
Tags: CloudAccess, Kevin Nikkhoo, career accomplishments, IT
Ireland top least-malware-infected nations for the first time PandaLabs, Panda Security's antimalware laboratory, today published its Quarterly Report for Q3, analyzing the IT security events and incidents from July through September ...
A European aeronautical supplier's website has been infected with a state-sponsored zero-day exploit, according to security firm, Sophos. Business IT administrators and other computer users should use caution in the light of the discovery ...
Tags: European aeronautical supplier, website, Microsoft software
The planned introduction of more than 1,900 new generic top-level domain (gTLD) names by Internet Corporation for Assigned Names and Numbers (Icann) could have security implications, researchers have warned. The plan to allow web ...
Tags: gTLD, Icann, security implications
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...
Tags: highlightedpost, Microsoft, Microsoft ERP, Security researchers
The amount of mobile Android malware has surged this year, from a count of 30,000 malware specimens in June to almost 175,000 last month, according to Trend Micro’s Security Roundup report for the third quarter of this year. ...
Tags: Android, apps, Google, highlightedpost, malware, security, Trend Micro
A group of hackers has released a file containing unique identification data for over 1 million Apple iOS devices and claim that the information is part of a larger database stolen from the compromised laptop of an FBI agent. "During ...
Tags: group of hackers, database, unique identification data, FBI agent
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...