Apple said Tuesday it had no "backdoor" in its products after a security researcher and a leaked document suggested the US National Security Agency had unfettered access to the iPhone. Apple said in an email to AFP that it "has never ...
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
Oracle plans to make changes to strengthen the security of Java, including fixing its certificate revocation checking feature, preventing unsigned applets from being executed by default and adding centralized management options with ...
Tags: Oracle, Java Security Improvement
IDG News Service - Google wants vendors to fix or offer mitigation advice for previously unknown and actively exploited software vulnerabilities within seven days of their discovery. "After 7 days have elapsed without a patch or advisory, ...
Tags: Google, Software Vendor
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics ...
Tags: Computer Products, software
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics ...
Tags: POS malware, computer, net
Microsoft later today will reverse a months-long practice in how Internet Explorer 10 (IE10) handles Adobe's Flash Player on Windows 8's and Windows RT's Modern user interfaces. The change will be pushed to users along with the March ...
Research teams Wednesday cracked Microsoft's Internet Explorer 10 (IE10), Google's Chrome and Mozilla's Firefox at the Pwn2Own hacking contest, pulling in more than $250,000 in prizes. Earlier in the day, a solo hacker exploited Oracle's ...
Tags: Microsoft, Oracle's Java, explorer
Political activists from the Middle East were targeted in attacks that exploited a previously unknown Flash Player vulnerability to install a so-called lawful interception program designed for law enforcement use, security researchers from ...
Tags: Flash Player, Adobe, mergency update
Unidentified attackers stole sensitive information from hundreds of diplomatic, government, research and military organizations from around the world as part of a newly uncovered cyberespionage campaign that started nearly six years ago. ...
Tags: attackers, sensitive information, cyberespionage campaign
An exploit for a previously unknown and currently unpatched vulnerability in Java is being used by cybercriminals to infect computers with malware, according to security researchers. An independent malware researcher who uses the online ...
Tags: exploit, unpatched vulnerability, Java, cybercriminals
IDG News Service - Adobe Systems warned users of its ColdFusion application server software that hackers are reportedly exploiting unpatched vulnerabilities in the product to take control of affected servers. The company published a ...
Tags: Adobe Systems, ColdFusion application server software, software
A security researcher claims that he found 23 vulnerabilities in industrial control software from several vendors after a different security company last week showcased vulnerabilities in applications from some of the same manufacturers, ...
Tags: security researcher, vulnerabilities, industrial control software
Orange Android devices will come pre-installed with the Lookout Mobile Security application to prevent mobile devices being affected by malware and spyware. The application will run in the background of the device, scanning applications ...
Tags: Orange Android devices, Lookout Mobile Security, malware and spyware
Computerworld - Two security organizations have released online tools that let Windows users check for possible infections by Gauss, the newly-revealed cyber surveillance malware thought to have been built by one or more governments. ...
Tags: security organization, online tools, Windows, cyber surveillance