Bit9 said a common Web application vulnerability was responsible for allowing hackers to ironically use the security vendor's systems as a launch pad for attacks on other organizations. Based in Waltham, Massachusetts, the company sells a ...
Tags: Bit9, Web application vulnerability, network
The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid ...
Tags: Mega, file-sharing service, vulnerability reward program
Developers of the Ruby on Rails Web development framework released versions 3.0.20 and 2.3.16 of the software on Monday in order to address a critical remote code execution vulnerability. This is the third security update released in ...
Tags: Ruby on Rails Web, software, company news
Cloud hosting company FireHost has claimed that cross-site scripting attacks increased by an estimated 160 per cent in the final quarter of 2012. The company claims that it has detected a spike in what it calls a "superfecta" of attempted ...
6Scan, a Web security startup based in Tel Aviv launched a new service on Tuesday that can scan websites for security issues, such as vulnerabilities and malware infections, and allows the website owners to automatically fix the problems. ...
Tags: Web security, 6Scan, cyber security
Those using the Ruby on Rails web application framework on their websites are being advised to update the software immediately after multiple new vulnerabilities were found. It's the second time this month that Rails has been patched ...
Tags: Ruby on Rails, web application framework, websites, software
The developers of Ruby on Rails, a popular open source Web application development framework for the Ruby programming language, released versions 3.2.10, 3.1.9, and 3.0.18 of the software on Wednesday in order to patch a serious SQL ...
Tags: Ruby on Rails, open source Web app, Ruby programming language
A group of hackers on Thursday published a list of over 453,000 log-in credentials on the Internet that were allegedly stolen from a database associated with an unnamed Yahoo service. The group of hackers calls itself "the D33Ds Company" ...
Tags: hackers, Yahoo, database, leaked information, MySQL
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cybercriminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from Australian security ...
Tags: cloud providers, botnets, cybercriminals, malicious traffic
A typical Web application is the target of an attack at least one in three days on average,according to a report released by data security firm Imperva. The third edition of Imperva's semi-annual Web Application Attack ...
IDG News Service - A tool for testing if web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat USA 2010 security conference on Wednesday. The tool and the research ...
Tags: web application firewalls, Black Hat USA 2010, cyber security
IDG News Service-An Arizona man has admitted his involvement in a May 2011 computer attack against the website of Sony Pictures Entertainment that was carried out by the now-defunct LulzSec hacker group. On Thursday,Raynaldo Rivera,20,of ...
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
Technology firms including Google,Apple,eBay and Yahoo were among almost 300 companies whose websites were hit by a hack attack in Pakistan. The attack,which exploited vulnerabilities in domain name systems(DNS)to redirect ...
Tags: Googl, Technology firms, attack in Pakistan
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products