Protection of consumer rights still varies greatly between EU countries. Only 35% of Europeans are confident buying online from sellers in other EU countries and seven out of ten consumers do not know what do to when they receive products ...
Tags: Single Market, Consumers
Clothing and fashion are very vulnerable to high street decline because online clothing sales only amount to 15% of total apparel sales, compared to perhaps half of all sales for books and consumer electronics. When the High Street ...
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations because most of them have outdated versions of the software ...
Tags: Java, soft security, software, Computer Products
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system. Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and ...
Tags: Computer Products, software
Specialist meat packer Hilton Food Group's strategy of operating with one customer per market could lead it to benefit from the horsemeat crisis, predicted City analyst Shore Capital. Hilton Foods' business model of one customer per ...
Tags: Hilton Foods, Agriculture, Food
Security researchers from Polish vulnerability research firm Security Explorations claim to have identified a new vulnerability in Java 7 that could allow attackers to bypass the software's security sandbox and execute arbitrary code on the ...
Tags: Computer Products, software
A four-year-old vulnerability could infect 99 per cent of Android devices with Trojan malware without users even realising, a team of security researchers has claimed. A blog post by Bluebox CTO Jeff Forristal said the vulnerability has ...
Tags: Android, virus, data safety
The leaders of the world's leading gas exporting nations are due to meet in Moscow Monday for the second summit of the Gas Exporting Countries Forum to discuss the future of the gas market amid uncertainties over the supply and demand ...
Tags: Gas Exporting
The National Security Agency can retain communications of U.S. citizens or residents potentially indefinitely if those communications are encrypted, according to a newly leaked secret government document. The document describes the ...
Tags: NSA, Encrypted Communications
Microsoft took a two-year-old contest and turned it on its head to come up with a new reward program that will pay security researchers up to $100,000 for demonstrating novel attack tactics against Windows 8.1. In a broad announcement ...
Tags: Microsoft, Windows 8.1, Bounty Program
Microsoft on Wednesday backpedaled from a long-standing refusal to pay bug bounties when it announced a temporary program for the beta of Internet Explorer 11 (IE11). The Internet Explorer 11 Preview Bug Bounty will start June 26, the day ...
Java continues to be Public Enemy No. 1 when it comes to computer and network security. Oracle released a huge update for the virtually ubiquitous software, but attackers aren’t done exploiting Java as the weakest link in the security ...
Tags: Java Update, Oracle
Fresh from yesterday's revelations about BlackBerry security holes discovered by GCHQ at 2009's G20 meetings, BlackBerry is fighting similar claims against its newest BlackBerry 10 platform. BlackBerry posted an advisory on its Knowledge ...
Tags: Blackberry, Z10
Microsoft will pay security researchers for finding and reporting vulnerabilities in the preview version of its Internet Explorer 11 (IE 11) browser, for finding novel techniques to bypass exploit mitigations present in Windows 8.1 or later ...
Tags: Microsoft, Windows 8, IE, Security Bounty Programs
A newly discovered Trojan program exploits previously unknown flaws in Android and borrows techniques from Windows malware in order to evade detection and achieve persistence on infected devices. Security researchers from antivirus firm ...