Cloud computing is an opportunity information security professionals should not miss,according to Philippe Courtot,chairman and CEO of security company Qualys. "This is a fantastic and opportunity to sit down with the CIO and the ...
Tags: Cloud computing, Information security, Qualys, London
Samsung is facing calls to issue a security update for the Galaxy S3 smartphone after it was discovered that the device can be reset by code hidden in a web page. German security researchers have demonstrated how an 11-character code can ...
Tags: Samsung, Galaxy S3, smartphone, vulnerability, hackers
Security researchers have discovered a new vulnerability in all supported versions of Oracle Java that enables attackers to bypass sandbox defences. The vulnerability, which affects Java Standard Edition versions 5, 6 and 7, can be used ...
Tags: Java Flaw, Bypass Sandbox, vulnerability, Security Explorations
After nine months of deliberations and some changes on Google's side,the Norwegian Data Protection Authority lifted a ban on the use of Google Apps by municipalities. However,the decision does not give city authorities carte blanche to ...
Tags: Norway, Google Apps, Ban, Norwegian Data Protection Authority
A security researcher known for finding Java bugs has uncovered a new critical zero-day vulnerability in all currently-supported versions of the popular Oracle software. The bug,which was publicly reported on the Full Disclosure security ...
Tags: Zero-Day Java Bug, security researcher, Security Explorations
Attendees at a security conference were left stunned when a researcher demonstrated how a hidden web code could allow a Samsung Galaxy S3's data to be completely wiped. The code,which is currently available online and consists of 11 ...
Tags: Samsung Galaxy S3', hidden web code, Apple, Ravi Borgaonkar
Microsoft has released an emergency out-of-cycle patch for the latest zero-day vulnerability in Internet Explorer that affects versions IE6 to IE9. The security update also addresses four other unrelated vulnerabilities,which were ...
Tags: Microsoft, update IE security, emergency out-of-cycle patch
Industrial Ethernet switches and other devices produced by industrial networking equipment manufacturer RuggedCom contain a vulnerability that could be exploited to compromise SSL-based communications between them and their users,according ...
Tags: Industrial Ethernet, ICS-CERT, SSL, security, vulnerability
"The number of fronts of risk and war, as some people call it, are definitely multiplying," says Clinton McFadden, senior operations manager for IBM X-Force research and development, which just released the results of its X-Force 2012 ...
Tags: Cyberwarfare, Trend and Risk Report., IBM, US
More than 50% of devices running Google's Android mobile operating system (OS) have unpatched vulnerabilities, opening them up to malicious apps and other attacks. Security provider Duo Bulletin assessed 20,000 Android devices worldwide ...
Tags: operating system, mobile, Android, unpatched vulnerabilities
Computerworld - Microsoft on Wednesday released a stopgap defense that protects Internet Explorer (IE) against attacks until the company issues a patch on Friday. The update will fix five flaws, including one revealed by a security ...
Microsoft says it is investigating reports of a vulnerability in Internet Explorer 6,7,8,and 9 as well as targeted attacks that have attempted to exploit the vulnerability. The zero-day flaw,which does not affect Explorer 10,was ...
Tags: Microsoft Investigates, IE ZeroDay Flaw, targeted attacks
The unique identifiers of 1 million Apple iOS devices that hackers leaked last week were stolen from the servers of a Florida-based digital publishing firm called Bluetoad. Bluetoad develops digital distribution technologies. Its ...
Tags: Apple iOS devices, US, Cybercrime, Hacking
Two security researchers claim to have developed a new attack that can decrypt session cookies from HTTPS (Hypertext Transfer Protocol Secure) connections. Websites use session cookies to remember authenticated users. If an attacker gains ...
Tags: Data Center, HTTPS, computer security, security research
Claims that 12 million unique device identifiers(UDIDs)of Apple iPads were hacked from the laptop of an FBI agent have been rebutted by the US law enforcement organisation. The FBI–which has its own Twitter feed–initially ...
Tags: FBI, Apple iPad UDID leak, 12 million unique device identifiers