BT, one of Yahoo's biggest customers for its Yahoo Mail service, has decided to dump the service in favour of its own BT Mail platform, which will be run by US messaging specialist Critical Path. Yahoo Mail accounts have been given ...
Tags: BT, Yahoo, Account Hijackings
A 17-year-old German student contends PayPal has denied him a reward for finding a vulnerability in its website. Robert Kugler said he notified PayPal of the vulnerability on May 19. He said he was informed by email that because he is ...
Tags: Computer Products, software
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface. The vulnerabilities could allow ...
Tags: Web Security Appliance, Security, Computer Products, web, Security vendor
One week after launching a security bug bounty program, the new file-storage and sharing service Mega claims to have fixed seven vulnerabilities, none of which met its highest severity classification. Since Mega was launched three weeks ...
Tags: Mega, security bug, file-storage, file-sharing
The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid ...
Tags: Mega, file-sharing service, vulnerability reward program
While the world’s online sharing community is excited about Kim Dotcom’s bold new venture, the file-storage and sharing service Mega, it is already drawing criticism from security researchers, who advise not to trust it. The ...
Security researchers say a patch released by Yahoo earlier this week for a serious email vulnerability did not fix the problem, leaving users at risk. The cross-site scripting flaw was found by Shahin Ramezany, who goes by the nickname ...
Tags: Marissa Mayer, patches, Yahoo, email, security
A typical Web application is the target of an attack at least one in three days on average,according to a report released by data security firm Imperva. The third edition of Imperva's semi-annual Web Application Attack ...
A hacker is selling a$700 zero-day exploit for Yahoo Mail that lets an attacker use a cross-site scripting(XSS)vulnerability to steal cookies and hijack accounts. The hacker,known as"TheHell",created a video to market the exploit on an ...
Tags: hacker, Yahoo mail
Technology firms including Google,Apple,eBay and Yahoo were among almost 300 companies whose websites were hit by a hack attack in Pakistan. The attack,which exploited vulnerabilities in domain name systems(DNS)to redirect ...
Tags: Googl, Technology firms, attack in Pakistan
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
HERZELIA, ISRAEL, July 12, 2012 /24-7PressRelease/ -- Alentus announced today its partnership with GamaSec, a remote online website security scan service. GamaScan identifies web application vulnerabilities, provides real-time vital ...
Tags: Alentus, GamaSec, online website security scan service
The Information Commissioner's Office is to investigate claims that Tesco's website does not offer sufficient privacy protections to customers. The UK privacy watchdog's probe comes after security experts raised a number of privacy ...
Tags: watchdog, Tesco Website, privacy protections, security problems
SQL injection (SQLi) attacks rose 69% in the second quarter of 2012 compared with the previous quarter, according to the latest report from secure cloud hosting firm FireHost. FireHost said that, between April and June, it blocked nearly ...
Tags: SQL injection, SQLi attacks, FireHost, secure cloud hosting
Most firms have inadequate defences for web applications, a study has revealed. The reason is that defences tend to be geared around attack averages, said Amichai Shulman, chief technology officer at security firm Imperva. But the ...
Tags: web applications, Web Application Attack, web security, Internet