Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations because most of them have outdated versions of the software ...
Tags: Java, soft security, software, Computer Products
US stocks ended a tumultuous day with strong gains after a false tweet briefly sent financial markets veering, underscoring technology's role in tightly linking global markets. The Dow Jones Industrial Average briefly plunged Tuesday ...
Tags: US Markets, Reel on False
US President Barack Obama has finally signed a much-anticipated executive order to protect key elements of the country's critical infrastructure against cyberattacks. Covering power plants, water utilities and other high-profile targets, ...
Tags: cyberattacks, infrastructure, Barack Obama
According to a survey of 56 corporate and governmental organisations conducted by the Ponemon Institute, the average amount paid for all the costs associated with cyber attacks was $8.9 million during the past year. That’s up 6% from ...
Tags: costs, cyber attacks, cyber criminals, cybercrime, highlightedpost, Ponemon
A new piece of malicious software targeted at Apple users has been found on a website dedicated to the Dalai Lama. The malware, nicknamed “Dockster,” is a backdoor that allows an attacker to control the victim’s ...
Tags: Apple, botnets, Dockster, highlightedpost, malware, Web attacks
UK domain registrar 123-reg is helping website owners to protect themselves and their visitors with a new tool that identifies and helps remove malicious code from legitimate websites. According to the latest Anti-Phishing Working Group ...
Tags: compromised websites, legitimate websites, star Emma, Scanner software