- Cabinet Office seeking suppliers for GOV.UK Verify
- Ofcom fended off 1,600 cyberattacks in two months, FoI request reveals
- Sony cancels 'The Interview' release after threats following cyberattack
- ‘Backdoor’ may be on 10m Coolpad Android smartphones
- Forensic software gets around iCloud security features
Exploits / vulnerabilities - News, Features, and Slideshows
A grinch may be snatching away some year-end holiday time, forcing Linux system administrators to fill a gaping security hole in their systems.
Vulnerabilities with catchy nicknames get more attention from media, customers, and vendors and so get patched more thoroughly than similar vulnerabilities without clever names.
An Israeli security firm has found a security flaw in Alibaba Group's international marketplace that could have wreaked havoc for the scores of merchants on the site.
Internet Explorer and Exchange Server top the list of Microsoft programs needing to be patched by IT administrators this month, now that the company has rolled out its latest round of "Patch Tuesday" security fixes.
Serious vulnerabilities exist in Google App Engine (GAE), a cloud service for developing and hosting Web applications, a team of security researchers has found.
Subdomains that once served a purpose but later were forgotten by website administrators can be abused by hackers to attack users of sites under the same main domain.
Webmasters who patched their sites against a serious SSL flaw discovered in October will have to check them again. Researchers have discovered that the vulnerability also affects implementations of the newer TLS (Transport Layer Security) protocol.
A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.
The Weather Channel has fixed a common web application security problem on its website that made nearly all links vulnerable to cross-site scripting attacks.
Siemens released security updates for several of its SCADA (supervisory control and data acquisition) products for industrial environments, in order to fix critical vulnerabilities that may have been exploited in recent attacks.
Adobe released an emergency patch on Tuesday to fix a Flash Player vulnerability that was fixed last month but was quickly exploited again.
Using the "less" Linux command to view the contents of files downloaded from the Internet is a dangerous operation that can lead to remote code execution, according to a security researcher.
BitTorrent dismissed claims that its popular peer-to-peer file synchronization program BitTorrent Sync has an insecure cryptographic implementation that potentially gives the company access to users' files.
Attacks that exploit the Shellshock vulnerabilities recently patched in the Bash Unix deliver a malware program that tries to compromise systems running BusyBox, a collection of Unix utilities typically used on embedded devices like routers.
AV vendors, in fierce competition for users, should remember that cooperation is key in fighting malware, a top Microsoft security official said Friday.
- New Vocus/Amcom entity will have initial personnel restructure
- Schneider Electric wins 2014 Platts Global Energy Award
- New undersea cable to link Australia and New Zealand
- Communications service providers will face heavy capex in coming years: Ovum
- Sony Pictures cancels Christmas day release of 'The Interview' following hacks
- Technology, simplicity and culture: Behind the scenes of Sensis’ digital transformation
- Melbourne Stars look to fan engagement with mobile marketing offer
- Forget 2015: Bing already knows which people, products and trends will win next year
- Predictive analytics for the masses gets closer with vendor investments
- Second-screen ad synching to take off in 2015