An Adobe Flash exploit has targeted three sites. Adobe Systems on Thursday announced knowledge of the exploit and what steps to take. The company assigned the CVE identifier CVE-2014-0502 to the vulnerability. Its security bulletin ...
Tags: zero-day exploit, Security updates, Adobe Flash Player
Firefox is the most stable web browser and Internet Explorer (IE) the most error- and crash-prone, according to mobile testing company Sauce Labs. It made the claims after testing the various popular browsers. Further reading Microsoft ...
Tags: Computer Products, Firefox, software
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to ...
Tags: SAP Security, HTTP Services
A so-called "watering hole" hacking attack on the US Department of Labor website last week has spread to nine more global websites over the weekend, including those used by European aerospace and nuclear researchers. Originally discovered ...
Tags: IE, Military Sites, Computer Products
Microsoft late Friday confirmed that a "zero-day," or unpatched, vulnerability exists in Internet Explorer 8 (IE8), the company's most popular browser. According to multiple security firms, the vulnerability has been used in active ...
Microsoft has announced that seven patches will be released on Tuesday 12 March. The bulletins, as Microsoft calls them, comprise four "critical" and three "important" updates. The critical updates address vulnerabilities in Microsoft ...
Tags: Microsoft, patch, company news
The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor ...
Tags: Java, Bit9, technology
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks. The vulnerabilities, identified as CVE-2013-1493 and CVE-2013-0809, are ...
A new exploit for a previously unknown and unpatched Java vulnerability is being actively used by attackers to infect computers with malware, according to researchers from security firm FireEye. "We observed successful exploitation ...
Tags: Computer Products, Computer, software
Microsoft has confirmed that it's the latest among a number of high-profile technology and internet firms to have been hit by a cyber attack. A blog posted on Friday by Microsoft security manager Matt Thomlinson revealed: Java is a ...
Tags: Microsoft, cyber attack, cyber security
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at ...
Tags: Adobe Reader, anti-exploitation protection, Adobe Reader Sandbox
Political activists from the Middle East were targeted in attacks that exploited a previously unknown Flash Player vulnerability to install a so-called lawful interception program designed for law enforcement use, security researchers from ...
Tags: Flash Player, Adobe, mergency update
Adobe has been forced to investigate reports of a zero-day security flaw in its Reader and Acrobat software that leaves users vulnerable to cyber-attacks. The exploit was discovered by researchers at network security firm FireEye, who ...
Tags: Adobe, zero-day security flaw, Reader and Acrobat software
Oracle's head of Java security, Milton Smith, has assured users of the software that the vendor will fix its security issues and improve communication efforts. In a conference call with Java User Group leaders, Smith outlined the ...
Tags: Oracle, Java security, software
Researchers from Security Explorations, a Poland-based vulnerability research firm, claim to have found two new vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software's security sandbox and execute arbitrary code ...