SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to ...
Tags: SAP Security, HTTP Services
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at ...
Tags: Adobe Reader, anti-exploitation protection, Adobe Reader Sandbox
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and probably part of ...
A computer worm that propagates by exploiting a 2010 Windows vulnerability is responsible for some of the recent incidents involving network printers suddenly printing useless data,according to security researchers from Symantec. Many ...
Tags: rogue printouts, Security Researchers, computer worm, Trojan program
German engineering firm Siemens has issued a fix for the software vulnerabilities in its programmable logic controllers (PLCs) that were exploited by Stuxnet. The computer worm was discovered in 2010 when it caused malfunctions at ...
Tags: Siemens, software, programmable logic controllers, PLCs, Stuxnet