Network World-A researcher at North Carolina State University has uncovered a vulnerability that could be exploited to send deceptive text messages from some Android devices,as part of a phishing scheme. MORE ON ANDROID:Hottest Android ...
Tags: Android SMS, vulnerability, phishing scheme
IDG News Service-Security researchers from antivirus vendor Symantec have uncovered a piece of malware that uses Google Docs,which is now part of Google Drive,as a bridge when communicating with attackers in order to hide the malicious ...
Tags: malware, Google Docs, proxy, Google drive
A group of hackers on Thursday published a list of over 453,000 log-in credentials on the Internet that were allegedly stolen from a database associated with an unnamed Yahoo service. The group of hackers calls itself "the D33Ds Company" ...
Tags: hackers, Yahoo, database, leaked information, MySQL
Researchers have found a serious vulnerability in the game "Call of Duty: Modern Warfare 3," and another in the CryEngine 3 graphics platform on which many games run. Luigi Auriemma and Donato Ferrante of security consultancy ReVuln ...
Tags: vulnerability, Call of Duty, Modern Warfare 3, CryEngine 3, games
Technology and process upgrades implemented since the controversial 2000 presidential election have made electronic voting machines more secure and reliable to use, the Caltech-MIT Voting Technology Project said in a report last week. ...
Tags: electronic voting machine, MIT, security, USA
Microsoft today said it will release seven security updates next week--including one rated critical for Windows 8 and Windows RT--to patch 12 vulnerabilities in Windows,Office,SharePoint Server and the company's website design software. ...
Jenkins, the open source continuous integration server that forked out of Oracle's Hudson project, is facing several security vulnerabilities Monday, with the Jenkins project leader recommending upgrades to the Jenkins core and some ...
Tags: Jenkins, security vulnerabilities, integration server, Computer Products
The path from birth to death is filled with choices about where to work and what kind of work to do. Sometimes the world is nice enough to allow us some input. These days, developers have a lot more say in their employment, thanks to rising ...
Attackers are exploiting a "zero-day" vulnerability in Microsoft's Internet Explorer (IE) and hijacking Windows PCs that cruise to malicious or compromised websites, security experts said Monday. Microsoft confirmed the IE bug, saying, ...
Tags: Hackers, IE, Computer Products
IDG News Service - Cisco Systems has warned customers about critical vulnerabilities in the Sophos antivirus engine included in its Cisco IronPort email and Web security appliances. "Cisco IronPort Email Security Appliances (ESA) and ...
Tags: Cisco Systems, antivirus engine, Web security appliances
IDG News Service - Google on Tuesday released a Chrome upgrade that improves how the browser renders 3D applications, including mouse-controlled games. The improvement comes via the inclusion of the Pointer Lock JavaScript API, commonly ...
Tags: Google, Chrome upgrade, 3D applications, mouse controlled games
IDG News Service-The notorious malware known as the Conficker worm still infects computers,a sort of wild horse with no rider,but investigators appear no closer to finding its creator. Also known as"Downandup,"Conficker was discovered in ...
Tags: conficker worm, notorious malware, evidence collection
Computerworld - An elite hacker group targeting defense industry sub-contractors has an inexhaustible supply of zero-days, or vulnerabilities that have yet to be publicized, much less patched, Symantec said today. In a blog post, the ...
Tags: Elite hacker gang, zero day bugs, Google, hackers, zero day
IDG News Service - A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious ...
Tags: OS X, software, keychain, keychaindump
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration ...
Tags: Security researcher, botnet, Tor network, DDoS