Pessimists are fond of saying that no good deed goes unpunished. An Australian teenager who reported a security vulnerability in a government website and now faces legal troubles probably agrees. Joshua Rogers, a 16-year-old Victoria ...
Tags: Consumer Electronics, Electronics
Many door and window sensors, motion detectors and keypads that are part of security systems used in millions of homes and businesses can be bypassed by using relatively simple techniques, according to researchers from security consultancy ...
Tags: Office Security Systems
South Lanarkshire Council is on the lookout for security software providers in a tender worth nearly £1m. The Scottish council is looking for a partner to deliver a range of IT security-related services and software over a four-year ...
Tags: Computer Products, software
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data ...
Tags: Data encryption, Spy-Proof, Surveillance
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, according to new research. Independent Security Evaluators (ISE), a security consultancy based in ...
Attackers are using fake versions of a recently released report about a Chinese cyberespionage group as bait in new spear-phishing attacks that target Japanese and Chinese users. The report was released Tuesday by security firm Mandiant ...
Tags: cyberespionage, China, cyber security
Devices used by many radio and TV stations to broadcast emergency messages as part of the U.S. Emergency Alert System (EAS) contain critical vulnerabilities that expose them to remote hacker attacks, according to researchers from security ...
Tags: U.S.Emergency Alert System, remote hacker attacks, cyber security
Users who signed into third-party Web or mobile applications using their Twitter accounts might have given those applications access to their Twitter private "direct" messages without knowing it, according to Cesar Cerrudo, the chief ...
Tags: Twitter, security consultancy, company news
A built-in PDF viewer component based on JavaScript and HTML5 Web technologies has been added to the beta version of Firefox 19, Mozilla said Friday. The browser maker described the built-in PDF viewer as more secure and safer than ...
Tags: Firefox 19, Mozilla, browser
Microsoft and a respected researcher disagreed this week about whether a bug in Windows RT is actually a security vulnerability that should be patched. The bug, revealed Jan. 5 by a hacker known as "clrokr," can be used to bypass a ...
Tags: Microsoft, bug, Windows RT
For all the apocalyptic prognostications, 2012 turned out to be a relatively uneventful year from an information security standpoint. A cyber Pearl Harbor did not happen. Stuxnet and its kin did not take out any power grids or shut down ...
Tags: apocalyptic prognostications, 2012, information security, cyber
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cybercriminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from Australian security ...
Tags: cloud providers, botnets, cybercriminals, malicious traffic
Researchers have found a serious vulnerability in the game "Call of Duty: Modern Warfare 3," and another in the CryEngine 3 graphics platform on which many games run. Luigi Auriemma and Donato Ferrante of security consultancy ReVuln ...
Tags: vulnerability, Call of Duty, Modern Warfare 3, CryEngine 3, games