Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
The website of a U.S. organisation specialising in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer. A nation-state looking to compromise the ...
Tags: Nation-state, attack, IE, flaw
Oracle added a feature in Java that lets companies control what specific Java applets are allowed to run on their endpoint computers, which could help them better manage Java security risks. The new feature is called the "Deployment Rule ...
Tags: Computer Products, software
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations because most of them have outdated versions of the software ...
Tags: Java, soft security, software, Computer Products
Bit9?has teamed with FireEye and Palo Alto Networks, which each have?sandboxing?technologies, in order to share information related to zero-day attack code. FireEye and Palo Alto Networks, with its next-generation firewall, each have ...
Tags: Computer Products, software
The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor ...
Tags: Java, Bit9, technology
Security company, FireEye, has announced a new threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many traditional defences, such as firewalls and anti-virus, are not enough ...
Bit9 said a common Web application vulnerability was responsible for allowing hackers to ironically use the security vendor's systems as a launch pad for attacks on other organizations. Based in Waltham, Massachusetts, the company sells a ...
Tags: Bit9, Web application vulnerability, network
Security vendor Bit9 promised to release limited details of a hack caused by a failure of the company to install the same security software on its own network that it sells to a handful of Fortune 500 companies. Bit9, which is based in ...
Tags: Bit9, security software, network
One-quarter of more than 400,000 Android apps examined in the Google Play store pose security risks to mobile-device users,according to new research. SECURITY:Android malware market exploding,says Trend Micro Security vendor Bit9 ...
Tags: Security Research, Android apps, mobile-device, Google Play
One-quarter of more than 400,000 Android apps examined in the Google Play store pose security risks to mobile-device users,according to new research. SECURITY:Android malware market exploding,says Trend Micro Security vendor Bit9 ...
Tags: Google, android apps, android malware market, Bit9