An Adobe Flash exploit has targeted three sites. Adobe Systems on Thursday announced knowledge of the exploit and what steps to take. The company assigned the CVE identifier CVE-2014-0502 to the vulnerability. Its security bulletin ...
Tags: zero-day exploit, Security updates, Adobe Flash Player
Trend Micro has outlined its security predictions for 2014, and it has forecast that one major data breach will occur every month next year. It has also predicted an increase in advanced mobile banking and targeted attacks, along with ...
Tags: Trend Micro, Security, data breach, internet, web
Trend Micro’s Integrated Data Loss Prevention product has won DLP Solution of the Year at the prestigious Computing Security Awards. The internet security specialist was handed the award at a ceremony in London’s Russell Hotel ...
Tags: Trend Micro, clinch, DLP, award, London
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
Microsoft today said that attackers are exploiting a critical and unpatched vulnerability in Office 2007 using malformed documents to hijack Windows PCs, and that Office 2003 and Office 2010 are also vulnerable. The bug can be triggered ...
Tags: Microsoft, software, Computer Products
“Collecting more and more unstructured data will open up another whole degree of attractiveness and may well lead to attackers seeing value in a form not previously recognised by the organisation that owns the data.” So ...
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye. Poison Ivy is a remote access trojan (RAT) that was released eight ...
Tags: Computer Products, software
The Communications Electronics Security Group (CESG) has launched two new schemes to help organisations obtain the relevant expertise in the event that they are subjected to a cyber-attack. CESG, the information security arm of British ...
Tags: Computer Products, software
The number of mobile malware apps has jumped 614 percent in the last year, according to studies conducted by McAfee and Juniper Networks. The Juniper study – its third annual Mobile Threats Report – showed that the majority of ...
Tags: Computer Products, Mobile Malware
Last week's attack on the Virgin Radio Dubai website could have provided cyber-criminals with a springboard from which to launch targeted attacks, according to a researcher from Kaspersky Lab. The popular music station's website was taken ...
Tags: Computer Products
An ongoing cyberespionage campaign compromised over 350 high-profile victims from more than 40 countries over the past eight years, including political activists, research centers, governmental institutions, embassies, military contractors ...
Threats from malware specifically targeting social media and the number of spam emails have both risen significantly in the first quarter of this year. That's according to the McAfee Threats Report: First Quarter 2013, which reveals that ...
Tags: Social Media Malware, McAfee
IDG News Service - Google wants vendors to fix or offer mitigation advice for previously unknown and actively exploited software vulnerabilities within seven days of their discovery. "After 7 days have elapsed without a patch or advisory, ...
Tags: Google, Software Vendor
U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property. The 100-page report, ...
Tags: IP, US, Computer Products
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users. KitM (Kumar in the Mac), also known as HackBack, ...
Tags: OS X Spyware, Mac, Computer Products