Fujitsu, the leading Japanese information and communication technology (ICT) company, has released version 3 of Fujitsu Enterprise Application GLOVIA G2, production-management ERP for discrete manufacturing. With latest improvements , the ...
Tags: GLOVIA G2
An Adobe Flash exploit has targeted three sites. Adobe Systems on Thursday announced knowledge of the exploit and what steps to take. The company assigned the CVE identifier CVE-2014-0502 to the vulnerability. Its security bulletin ...
Tags: zero-day exploit, Security updates, Adobe Flash Player
New York – Aereo, the controversial local TV service for mobile devices, said Friday that it is preparing to launch service in the greater Cincinnati area as the next leg in its national expansion. The Aereo service will launch in a ...
Tags: Aereo, Cincinnati
North Carolina is famous for its high-tech Research Triangle, but lately it seems that state government IT projects are bound for IT's equivalent of the Bermuda Triangle. As you may remember from an earlier Risk Factor story on state ...
Tags: Consumer Electronics, Electronics
A new type of Trojan horse computer virus could result in mass attacks on banks, exposing the personal details of an unprecedented number of online banking customers. Discovered by security software provider Kaspersky Labs, the Neverquest ...
Tags: warning, mass, Trojan, attack, against, online, bank, customer
A new Trojan programme that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn. The malware was first advertised on a private cybercrime forum in July, ...
Tags: Online Banking, Threatonline, financial services, security
Facebook and Microsoft are winning plaudits from security researchers for launching an initiative to offer bounties to bug hunters who discover and report vulnerabilities in widely used products. Unlike other bug bounty programmes, the ...
Tags: security, researcher, laud, Microsoft, Facebook, bounty
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
The website of a U.S. organisation specialising in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer. A nation-state looking to compromise the ...
Tags: Nation-state, attack, IE, flaw
Microsoft today said that attackers are exploiting a critical and unpatched vulnerability in Office 2007 using malformed documents to hijack Windows PCs, and that Office 2003 and Office 2010 are also vulnerable. The bug can be triggered ...
Tags: Microsoft, software, Computer Products
Microsoft has announced that Windows 8.1 is now globally available, and is downloadable as a free update from the Windows Store. Microsoft cites a number of "key attributes" in the release, including "an improved and hughly customised ...
Tags: Windows 8.1, Computer Products, software
Microsoft has joined Google and Facebook in plotting a replacement for the cookie. For many years the humble cookie, a small text file that browsers download when they visit a web site, has been one of the mainstays of online advertising, ...
Tags: Computer Products, Microsoft, Google, Facebook, Cookie
As anticipated, the latest round of Microsoft’s Patch Tuesday monthly release of security fixes addresses a widely known Internet Explorer (IE) vulnerability already being exploited by malicious hackers. Overall, for October’s ...
While Windows 8.1 promises many changes from Windows 8, one thing that will remain the same is the price to U.S. consumers. For people who are on Windows 7 and previous editions of the OS, the standard version of Windows 8.1 will cost ...
Tags: Computer Products, software
Adobe released security updates for Flash Player, Adobe Reader and Shockwave Player on Tuesday to address critical vulnerabilities that could allow attackers to take control of systems running vulnerable versions of those programs. The ...
Tags: Adobe, Flash Player