Consumer Reports has removed its "Don't Buy: Safety Risk" designation from a stroller it tested last year after finding that a newer model did not pose the same safety risks. In earlier tests, we found that the positioning of the grab bar ...
Tags: Auto Parts, Security, Protection
Apple yesterday updated OS X Mountain Lion for the first time in six months, patching 14 security vulnerabilities and addressing a host of other issues. Alongside the operating system update, Apple also upgraded the Safari browser to ...
Tags: Apple, OS X Mountain Lion, Safari
Adobe today patched Flash Player, the fifth time this year it's updated the vulnerability-plagued software. Unlike two of the three updates last month, however, today's was part of Adobe's regularly-scheduled patch cadence. Last ...
The London Olympics faced six major cyber attacks during the Games out of some 165 million individual security-related "events" identified by the IT team put together by Gary Pennell, the CIO of the London 2012 Olympics. Cloud was a ...
Romanian security company BitDefender today said it has traced the cyber-espionage malware "MiniDuke" back to June 2011, more than a year and a half before the campaign was uncovered. BitDefender found the malware by digging through its ...
Tags: BitDefender, MiniDuke, espionage malware
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks. The vulnerabilities, identified as CVE-2013-1493 and CVE-2013-0809, are ...
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks. The vulnerabilities, identified as CVE-2013-1493 and CVE-2013-0809, are ...
Tags: Oracle, Emergency Fix, Java Vulnerabilities
Internet Explorer's poor reputation for security is undeserved, with Mozilla Firefox actually the most vulnerable internet browser in common usage. That's according to research by network security solutions provider Sourcefire, which ...
A cyber espionage operation dubbed MiniDuke has targeted government organisations in as many as 23 countries, security vendors said on Wednesday. The malware uses well-crafted PDF documents to trick recipients into opening the malicious ...
Tags: MiniDuke, Malware, Governments
Bit9 said a common Web application vulnerability was responsible for allowing hackers to ironically use the security vendor's systems as a launch pad for attacks on other organizations. Based in Waltham, Massachusetts, the company sells a ...
Tags: Bit9, Web application vulnerability, network
Facebook has patched a serious vulnerability that could have allowed attackers to easily gain access to private user account data and control accounts by tricking users into opening specifically crafted links, a Web application security ...
Tags: Facebook, user account data, company news
Apple says it has been hit by hackers who wormed their way into the California company's system but evidently failed to steal any data. The maker of iPhones, iPads, iPods, and Macintosh computers said it is working with law enforcement ...
Tags: APPLE, iPhones, iPads, iPods, Macintosh computers
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification. Since Mega was launched three weeks ...
Tags: Mega, security bug, file-storage, file-sharing
Microsoft this week patched 14 vulnerabilities in Internet Explorer (IE), preparing the browser for its time as a target early next month at the annual Pwn2Own hacking contest. On Tuesday, Microsoft patched 57 vulnerabilities, including ...
Tags: Microsoft, Internet Explorer, patch
A critical buffer overflow vulnerability patched this week in the widely used open-source cURL library (libcurl) has the potential to expose a large number of applications and systems to remote code execution attacks. CURL is a ...
Tags: buffer overflow vulnerability, remote code execution attacks, protocols