Microsoft today said it will ship just five security updates next week, the fewest in any month so far this year, to patch 23 vulnerabilities in Internet Explorer (IE), Windows and Office. The update for Office will address a bug that is ...
Tags: Microsoft, Computer Products, Office Bug
A new exploit kit called Whitehole has emerged on the underground market, providing cybercriminals with one more tool to infect computers with malware over the Web, security researchers from antivirus vendor Trend Micro reported Wednesday. ...
Tags: Whitehole, underground market, malware, antivirus software
Internet users should consider disabling Java in their browsers because of an exploit that can allow remote attackers to execute code on a vulnerable system, the U.S. Computer Emergency Readiness Team (US-CERT) recommended late Thursday. ...
Tags: Internet user, Java, vulnerable system
An exploit for a previously unknown and currently unpatched vulnerability in Java is being used by cybercriminals to infect computers with malware, according to security researchers. An independent malware researcher who uses the online ...
Tags: exploit, unpatched vulnerability, Java, cybercriminals
Computerworld - Microsoft today patched 12 vulnerabilities in Windows, Office and several server and development products, but as it hinted last week, did not come up with a fix for the Internet Explorer (IE) bug that cyber criminals have ...
Tags: Microsoft, security updates, Windows, cyber criminals
Computerworld - An elite hacker group credited last year with having an inexhaustible supply of zero-day vulnerabilities was responsible for digging up and first using the newest unpatched bug in Internet Explorer (IE), a Symantec manager ...
Tags: hacker group, Internet Explorer, IE, Windows PCs
Attackers are exploiting a "zero-day" vulnerability in Microsoft's Internet Explorer (IE) and hijacking Windows PCs that cruise to malicious or compromised websites, security experts said Monday. Microsoft confirmed the IE bug, saying, ...
Tags: Hackers, IE, Computer Products
An exploit for an unpatched vulnerability in the Microsoft XML Core Services (MSXML) has been incorporated into Blackhole, one of the most widely used Web attack toolkits, according to security researchers from antivirus firm Sophos. The ...
Tags: vulnerability, Microsoft, MSXML, Blackhole, Web attack toolkits
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
Attacks targeting an unpatched vulnerability in the latest versions of Java 7 have become widespread after an exploit for the new flaw was integrated into the popular Blackhole attack toolkit, according to security researchers from ...
Tags: Java 7, unpatched vulnerability, attacks, exploit for flaw
A cyber gang thought to be based in Eastern Europe and the former Soviet Union is recruiting dozens of people to participate in a scheme to steal millions of dollars from 30 major U.S. banks, according to RSA. The organisers are thought ...
Tags: cyber crime, cyber criminals, highlightedpost, Trojan, banks
Cyber criminals targeted users of Skype,Facebook and Windows using multiple Blackhole exploits in October,according to the latest threat report from security firm GFI Software. Researchers uncovered a large number of Blackhole exploits ...
Tags: Cyber criminals, Facebook, Windows users, chameleon of internet threats
Unlicensed copies of popular software Keep up to date Patch applications with security updates Conficker still a threat Malicious key generation(keygen)software is one of the fastest-growing types of a malware,according to the latest ...
Tags: top cyber threats, malicious key, malicious keygen software
UK domain registrar 123-reg is helping website owners to protect themselves and their visitors with a new tool that identifies and helps remove malicious code from legitimate websites. According to the latest Anti-Phishing Working Group ...
Tags: compromised websites, legitimate websites, star Emma, Scanner software