Major high street banks are planning to impose new terms and conditions on customers that would make them squarely responsible for credit and debit card fraud. Further reading Seven-year glitch earns Bank of Scotland 4.2m fine Banks' IT ...
Tags: high street banks, finance, software, computing
A hacker in Egypt has released vague details of three vulnerabilities he claims to have found within Yahoo's website, the second time in two months he's found problems in the website of a major technology company. The hacker, who calls ...
Tags: hacker, vague details of three vulnerabilities, Yahoo's website
IDG News Service - Adobe plans in February to close a dangerous hole in its Shockwave application that causes the application to be downgraded when a user launches older multimedia content, allowing hackers to target years-old ...
Tags: Adobe, close, dangerous hole, Shockwave application
An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
A hacker in Egypt has released vague details of three vulnerabilities he claims to have found within Yahoo's website, the second time in two months he's found problems in the website of a major technology company. The hacker, who calls ...
Tags: Egyptian hacker, Computer Products, Yahoo
A suspected fault in how Samsung Electronics has implemented the Android's kernel in several of its devices could allow a malicious application to gain total control over the device. The vulnerability was described on Saturday by the user ...
Tags: Samsung, Computer Products, Android
The latest Java zero-day vulnerability is already available to users of the Metasploit tool and Blackhole exploit kit, say security researchers. The Java vulnerability allows attackers to use a custom web page to force systems to download ...
Tags: Metasploit tool, custom web, coded Java, security, FireEye
Mozilla yesterday took the unusual step of yanking Firefox 16 from distribution just a day after its release. The company said a critical vulnerability triggered the move. The bug was apparently overlooked by Mozilla while it was ...
Tags: Mozilla, yanking Firefox 16, distribution, critical vulnerability
Microsoft may have known about last week's Internet Explorer (IE) zero-day bug for some time, according to its security advisory. The vulnerability, which was patched Friday in an emergency, or "out-of-band," update, first became public ...
Tags: Microsoft, IE, bug, vulnerability
Samsung said Wednesday it is working on an update for a software flaw that could allow attackers to siphon personal data from a phone. The vulnerability affects Samsung's S2 and S3 phones and several models of its Galaxy line, including ...
Tags: Samsung, software flaw, siphon personal data, phone
Samsung said Wednesday it is working on an update for a software flaw that could allow attackers to siphon personal data from a phone. The vulnerability affects Samsung’s S2 and S3 phones and several models of its Galaxy line, ...
The launch of Google Maps in Apple’s App Store last week has boosted iOS 6 adoption by 29 per cent, new data reveals. When iOS 6 launched in September, many iPhone, iPad and iPod touch users decided not to update to Apple’s ...
Tags: Google Maps, IOS 6 Adoption, Computer Products, App
Security researchers from Poland-based security firm Security Explorations claim to have discovered a vulnerability in the Java 7 security update released Thursday that can be exploited to escape the Java sandbox and execute arbitrary code ...
Tags: security researchers, Security Explorations, vulnerability, Java 7
Apple's refusal to put into writing its operating system support policy leaves Snow Leopard users wondering whether their copy of OS X has been retired, security experts said today. The question "Is Snow Leopard retired?" went legitimate ...
Tags: Apple, Snow Leopard, OS X, Mac
Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. The vulnerabilities -- a session hijack, a heap ...
Tags: critical vulnerabilities, Huawei, Defcon, security