IDG News Service-Western Connecticut State University said Thursday that a vulnerability in its computer system present for more than three years may have exposed the data of 233,880 students and other people affiliated with the ...
Tags: vulnerability, Student Data, computer system
IDG News Service-A group of hackers leaked email contact information of experts working with the International Atomic Energy Agency(IAEA)after breaking into one of the agency's servers. The group published a list of 167 email addresses ...
Tags: computer systems, computer data, computer, information security
IDG News Service-The Romanian domain names of Google,Yahoo,Microsoft,Kaspersky Lab and other companies were hijacked on Wednesday and were redirected to a hacked server in the Netherlands. The hijacking occurred at the DNS(Domain Name ...
Tags: Attackers hijack, hacked server, Netherlands, security breach
A vulnerability in Oracle's Java software that attackers can use to remotely seize control of systems running the program is being sold for"five digits". The security hole is being sold by an established member of an ...
Tags: Oracle, Java zero-day exploit, MidiDevice, sold for'five digits'
The UK national Cyber Security Challenge has announced four face-to-face competitions for the next round of the current challenge. Cyber Security Challenge UK runs a series of national inspirational competitions aimed at attracting ...
Tags: Cyber Security Challenge, face-to-face competitions, cybersecurity
Computerworld - Adobe has changed its schedule for releasing Flash Player security updates to coincide with Microsoft's Patch Tuesday schedule. "Microsoft and Adobe are now officially married," joked Andrew Storms, director of security ...
Tags: Flash Player, security, updates
Cyber criminals targeted users of Skype,Facebook and Windows using multiple Blackhole exploits in October,according to the latest threat report from security firm GFI Software. Researchers uncovered a large number of Blackhole exploits ...
Tags: Cyber criminals, Facebook, Windows users, chameleon of internet threats
Google this week announced it had shipped a stronger Flash Player sandbox for the OS X version of Chrome,making good on an August promise to ship a Mac browser better able to ward off exploits of the Adobe software. Chrome 23,which ...
Tags: Google, Flash Player sandbox, OS X version of Chrome, PPAPI
Skype has disabled the account password reset option on its website following reports that the feature can be abused to hijack Skype accounts if the attackers know the email addresses associated with them. Instructions on how to exploit ...
Tags: Skype, potential attacker, password reset, account hijacking method
"I don't think IT realizes how much the way we live life as individuals has completely permeated the enterprise,"says Margaret Dawson,vice president of product management at Symform."This is happening whether you want it to or not." ...
Tags: Shadow IT, Symform, survey, rogue cloud use
Microsoft today patched 19 vulnerabilities in Windows,Internet Explorer 9(IE9),Excel and the.Net development framework,including four flaws in the just-released Windows 8 and its tablet spin-off Windows RT. Of Tuesday's six security ...
Tags: Microsoft, vulnerabilities, Windows, IE9
With SaaS(software as a service)having become a preferred deployment model for new software purchases,customers should be entitled to a clear-cut set of rights and expectations from vendors,a new report from analyst firm Constellation ...
Tags: SaaS, Constellation Research, software
This November marks the ninth year for which we will be announcing the Gibbs Golden Turkey Awards... To refresh your memories,these awards recognize those individuals,companies or entities that don't,won't or can't come to grips with ...
Tags: The Gibbs Golden Turkey Awards, GGTA, Yahoo, security, ESET
Software made by Siemens and targeted by the Stuxnet malware is still full of other dangerous vulnerabilities,according to Russian researchers whose presentation at the Defcon security conference earlier this year was cancelled following a ...
Tags: Siemens software, Stuxnet, Sergey Gordeychik, SCADA system
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. The zero-day ...
Tags: PDF, Cybercriminals, Adobe Reader, Group-IB