Facebook has admitted that laptops belonging to its employees were recently infected by malware, blaming a zero-day Java exploit for the incident. Users of the social network will be concerned that their private data may have been ...
Tags: Facebook, malware, zero-day Java exploit
Chinese authorities may be exploiting a security hole in Microsoft Office for Mac to target the Uyghur people, an ethnic group of people who live in parts of Asia and are seeking independence from Chinese rule, according to Kaspersky and ...
UK cereal maker Weetabix has had its WeetaKid mobile app banned for making children feel "inferior" if they did not eat the company's products. The app fell foul of the UK's Advertising Standards Authority, which ruled it "exploited" the ...
Tags: cereal maker, Weetabix, mobile app
Oracle isn't done releasing patches for Java SE this month, as another batch will arrive Feb. 19, according to a company blog post. On Feb. 1, Oracle pulled the trigger early on the February release, which had originally been scheduled ...
The US Federal Reserve has confirmed its computer systems were accessed by hackers but said the incident did not affect the central bank's "critical operations". The acknowledgement came days after the hacker group known as Anonymous ...
Tags: computer systems, Internet, computer
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification. Since Mega was launched three weeks ...
Tags: Mega, security bug, file-storage, file-sharing
Microsoft this week patched 14 vulnerabilities in Internet Explorer (IE), preparing the browser for its time as a target early next month at the annual Pwn2Own hacking contest. On Tuesday, Microsoft patched 57 vulnerabilities, including ...
Tags: Microsoft, Internet Explorer, patch
McAfee is enhancing its business security platform by adding near real-time querying capabilities to its ePolicy Orchestrator software and by integrating it with its security information and event management (SIEM) product to automatically ...
Tags: McAfee, business security, real-time querying capabilities
Microsoft will support its Surface Pro tablet until July 2017, or almost four-and-a-half years after its launch last weekend, the company's website confirmed. Like its predecessor the Surface RT, the Windows 8-powered Surface Pro sports a ...
Tags: Microsoft, Surface Pro tablet, Surface RT
Political activists from the Middle East were targeted in attacks that exploited a previously unknown Flash Player vulnerability to install a so-called lawful interception program designed for law enforcement use, security researchers from ...
Tags: Flash Player, Adobe, mergency update
A critical buffer overflow vulnerability patched this week in the widely used open-source cURL library (libcurl) has the potential to expose a large number of applications and systems to remote code execution attacks. CURL is a ...
Tags: buffer overflow vulnerability, remote code execution attacks, protocols
Adobe on Thursday updated Flash Player to patch a pair of zero-day vulnerabilities that hackers were already using to hijack Windows PCs and Macs. The out-of-band, or emergency, update was Flash's first of the year and the first since ...
iOS jailbreaks may come and go, but Apple continues to warn that hacking an iPhone to install unapproved software, while not illegal, may void the device's service warranty. The latest jailbreak -- the term for leveraging a vulnerability ...
The developers of many SSL libraries are releasing patches for a vulnerability that could potentially be exploited to recover plaintext information, such as browser authentication cookies, from encrypted communications. The patching ...
President Barack Obama's cybersecurity executive order, announced during his State of the Union address Tuesday night, elicited guarded praise from several quarters even as it revived calls for more comprehensive bipartisan legislation to ...