Some virtualisation admins are slow to update VMware’s patches because they are afraid their app functions won’t work, however patches fix vulnerabilities and are a risk that must be taken. Despite potential threats to a ...
A European aeronautical supplier's website has been infected with a state-sponsored zero-day exploit, according to security firm, Sophos. Business IT administrators and other computer users should use caution in the light of the discovery ...
Tags: European aeronautical supplier, website, Microsoft software
A security researcher published on Friday another attack on Facebook’s Instagram photo-sharing service that could allow a hacker to seize control of a victim’s account. The attack was developed by Carlos Reventlov around a ...
Tags: Apple, cyber attack, Facebook, Instagram, iPhone, social network
A group of hackers has released a file containing unique identification data for over 1 million Apple iOS devices and claim that the information is part of a larger database stolen from the compromised laptop of an FBI agent. "During ...
Tags: group of hackers, database, unique identification data, FBI agent
Attackers can abuse Facebook’s phone search feature to find valid phone numbers and the name of their owners, according to security researchers. The attack is possible because Facebook doesn’t limit the number of phone number ...
Tags: Facebook, highlightedpost, Mark Zuckerberg, Phone number search, privacy
Researchers from security firm Security Explorations have claimed to have discovered a vulnerability in the Java 7 security update released Thursday that can be exploited to escape the Java sandbox and execute arbitrary code on the ...
Tags: Adam Gowdiak, highlightedpost, Java 7, Java 7 vulnerability
The creators of the Flame and Stuxnet malware cooperated at least once during the early stages of development, security researchers have found. A link between the two suggests a connection between Flame and US involvement. At the ...
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Despite the downturn, 40% of organisations plan to increase their security budgets in 2013 in ...
Tags: IT security, security budget, security spending, IT industry
Hackers have compromised two servers used by the FreeBSD Project to build third-party software packages.Anyone who has installed such packages since Sept.19 should completely reinstall their machines,the project's security team warned. ...
Tags: hackers, FreeBSD, third-party software packages, SSH Keys
Cisco released free software updates to address multiple vulnerabilities in its AnyConnect Secure Mobility Client as well as other hardware security appliances including its ASA 5500 Series Adaptive Security Appliances. The Cisco ...
Tags: Cisco, free software, ASA
A computer worm that propagates by exploiting a 2010 Windows vulnerability is responsible for some of the recent incidents involving network printers suddenly printing useless data,according to security researchers from Symantec. Many ...
Tags: rogue printouts, Security Researchers, computer worm, Trojan program
A Yahoo user has sued the web portal company for negligence for allowing more than 450,000 user names and passwords to be stolen from one of its sites. Jeff Allan of New Hampshire, whose login credentials were posted online after a ...
Tags: Yahoo, user, personal data breach
On the occasion of the 65th Cannes Film Festival, of which Marilyn is the figurehead, Chopard is unveiling an exceptional series of 25 unpublished photographs of the star by Milton H. Greene, along with a stunning tribute jewelry creation ...
Tags: Caroline Scheufele, Eva Herzigova, Cannes Film Festival
Microsoft has patched 20 vulnerabilities in Word, Office, Windows, SharePoint Server, SQL Server and other products in its portfolio, including a critical bug in the company’s popular Word programme and another already used to attack ...
Tags: Bugs, Microsoft, Patches, Steve Ballmer, Trojan, vulnerabilities
With SaaS (software-as-a-service) having become a preferred deployment model for new software purchases, customers should be entitled to a clear-cut set of rights and expectations from vendors, a new report from analyst firm Constellation ...
Tags: SaaS, software, analyst firm, software purchase