Cisco Systems has released new security patches for several versions of Unified Communications Manager (UCM) to address vulnerabilities that could allow remote attackers to execute arbitrary commands, modify system data or disrupt services. ...
Tags: Computer Products, software, Electrical, Electronics
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network ...
Tags: Computer Products, software
Check Point has published its second mobile security report, revealing that 79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs. The report found mobile security incidents cost more ...
Huawei founder and president Ren Zhengfei has finally broken his silence on the US government's October 2012 suggestion that Chinese companies pose security risks. Speaking during a company press conference in New Zealand yesterday, ...
Tags: Huawei, Computer Products
The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor ...
Tags: Java, Bit9, technology
Applying big data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held ...
Tags: information security, RSA Conference 2013, data aggregation
Adobe on Saturday said it would release an emergency patch for two Reader zero-day vulnerabilities this week. Hackers have already been exploiting the bugs using rigged PDF documents sent as email attachments. "Adobe plans to make ...
Tags: Adobe, Windows, viewing software
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. "Today, we identified that a PDF zero-day [vulnerability] ...
Tags: FireEye, remote code, Adobe Reader
Professional liability insurance services provider AmerInst has added security incident and identification theft extension endorsement to its Protexure Accountants' professional liability insurance program. AmerInst Professional Services ...
RSA has unveiled a new tool designed to let enterprises detect security threats more quickly than current technologies permit by combining big data management and analytics approaches with traditional network monitoring and threat ...
Tags: RSA, security threats, big data management, analytics approaches
Nine out of 10 companies do not believe that they are vulnerable to hackers,despite the fact that half have faced a"security incident"in the past year. That is the conclusion of a report into computer security by consultants Deloitte ...
Tags: Nine out of 10 companies not vulnerable, security incident
Security firm Websense is to launch cyber security intelligence services to enable businesses to tap into the resources of its research teams. The official launch is scheduled for later this month, but Websense revealed some details of ...
Tags: Websense, cyber security intelligence services, security platform
Cybercriminals no longer control one of the world's largest spam botnets, Grum, because all of the servers the botnet relied on for receiving commands were shut down, according to researchers from security firm FireEye. The last Grum ...
Tags: Cybercriminals, spam botnets, Grum, servers
A buggy update released Friday by security vendor McAfee for its consumer and enterprise antivirus products, left the computers of its customers unprotected and, in some cases, unable to access the Internet. The incident affected both ...
Tags: McAfee Antivirus, consumer, enterprise, antivirus products
A group of hackers has released a file containing unique identification data for over 1 million Apple iOS devices and claim that the information is part of a larger database stolen from the compromised laptop of an FBI agent. "During ...
Tags: group of hackers, database, unique identification data, FBI agent