Adobe Reader, Adobe’s popular PDF viewer, has a flaw that is allowing hackers to install malware on users’ computers. The exploit affects the latest version of the program (11.0.1), as well as earlier versions. This appears to be Windows only.…Read More »
32% of computers around the world are infected with viruses and malware, according to Panda Security
Most anti-virus companies like to release yearly reports based on their findings throughout the year. Panda Security is no exception and has released its ’2012 Annual Security Report’. In this report you will find some stats that may or may …Read More »
Be sure to run Windows Update this Tuesday, Microsoft is going to release a monster update that fixes 57 vulnerabilities — including a critical Internet Explorer bug
Every second Tuesday of every month Microsoft releases patches of its products on Windows. This day has come to be known as ‘Patch Tuesday’. And this upcoming Patch Tuesday is going to be one you don’t want to miss.
In …Read More »
Attacks on Java may be subsided for a few days but the other kink in your armor — Flash — is now under attack. Adobe has released a security bulletin notifying Windows and Mac OS X users to update to …Read More »
Hackers have managed to access one of the US Federal Reserve’s websites and steal a “limited amount of data,” according to a statement. The notice that was sent via the Fed’s Emergency Communication System, however, warned that email addresses, phone …Read More »
“You don’t need [a zero-day exploit] to attack most Android devices if consumers are running 13-month old software,” says Chris Soghoian. Soghoian is principal technologist and senior policy analyst with the American Civil Liberties Union. He believes that the reason …Read More »
In the wake of (alleged) cyberwarfare by China, US president now has the power to order (preemptive) cyber attacks
According to a report by The New York Times, a secret White House legal review has granted the president of the United States the legal authority to order preemptive cyber attacks against a target (which can be a country), …Read More »
A hacker has been toying with the police and the general public in Japan since last summer. The hacker has remote controlled innocent people’s computers to send killing spree threats and a bomb threat to Nintendo headquarters. This was followed …Read More »
An upcoming book co-authored by Google’s Eric Schmidt and Jared Cohen was previewed by The Wall Street Journal, and it looks like China’s reputation as of late isn’t going anywhere anytime soon.
The book is called The New Digital …Read More »
No one’s really safe from hackers these days, with Twitter joining the New York Times as one of the recent victims of security breaches recently. Twitter announced in a blog post that it detected unusual access patterns during the week, …Read More »
Some may call it obvious but just having antivirus software installed isn’t going to help you much if hit by zero-day attacks. The New York Times had antivirus from Symantec (Norton) installed on the devices connected to their network, but …Read More »
What do you do when a student discovers then reports a serious vulnerability in your school’s network — so serious that it could potentially give access to students’ social security numbers, home addresses, phone numbers, class schedules and every other …Read More »
Latest version of Java (7u11) is still vulnerable, Oracle issued an incomplete patch according to experts
Something surprising happened last week. Oracle issued an update (Java 7u11, Java 6u37, Java 5u38, and Java 4u40) in just three days to patch a recently discovered and massively exploited Java vulnerability. And over the weekend, too. As it turns …Read More »
The traditional password is now considered by many to be a security flaw. A combination of characters that can be cracked or even guessed is probably not the best way to safeguard our online lives today, and services like LastPass …Read More »
There are two groups in this world that are notoriously quick to react to technological change — the porn industry and hackers. The porn industry is known for pioneering new technology to try to increase revenue. For example, porn websites …Read More »
AV-TEST Institute is an organization that runs anti-virus/anti-malware tests. During AV-TEST Institute’s latest Nov/Dec 2012 anti-malware testing, 3 out 25 anti-virus software failed to gain certification. One of those 3 is Microsoft’s popular Security Essentials. (The other two are AhnLab …Read More »
‘Red October’ is global espionage malware that targeted governments around the world (USA, Iran, Russia, etc.) for 5 years… without being detected
Researchers from antivirus firm Kaspersky Lab have discovered something that sounds like it came straight out of a spy movie. A massive, on-going espionage network targeting hundreds of governmental, diplomatic and scientific organizations in at least 39 countries. Before you …Read More »
You know that latest Java exploit that had the world up in arms, with Firefox and Apple blocking Java and U.S. Department of Homeland Security recommending people disable Java? Yeah, well, Oracle has issued updates to Java to address and …Read More »
A critical vulnerability in the Ruby on Rails framework has been discovered to bring devastating effects to those affected. One of the developers that confirmed its existence, Ben Murphy, says that it “gives hackers a simple and reliable way to …Read More »
New Java zero-day exploit hits the internet, is “massively exploited in the wild” — disable Java now!
So you thought Java season was over, eh? Wrong! It is still open season on Java and a brand new, previously unknown bug has been discovered in Java that allows scumbags to install malware on the computers of netizens.
It …Read More »
Like seemingly every other new OS that’s left in the wild for awhile, Microsoft’s Windows RT has been jailbroken. But hold on before you start rejoicing about the prospects of running all your favorite desktop applications on a Surface, it …Read More »
It looks like Yahoo! has learned its lesson when it comes to security. After its mail service was recently hacked by an XSS exploit, the company has not only patched the problem but is also quietly rolling out an HTTPS …Read More »
It looks like the bad news for Microsoft’s Internet Explorer just keeps piling on, with every other day seemingly bringing news about a new security problem for the browser.
This time, however, users of the most recent versions — namely …Read More »
If there’s one thing that Microsoft doesn’t need, it’s more bad publicity for Internet Explorer. The company’s browser has often been criticized to be slow and simply downright inferior compared to other offerings right now. Unfortunately for them, it looks …Read More »
A serious security flaw has been found in one of Samsung’s Exynos chipsets, news that no Galaxy device user wants to hear. The flaw affects the Samsung Exynos 4, which means that Galaxy S III, Galaxy Note, Galaxy Note 2 …Read More »
Since Windows XP, Windows comes with ‘AutoPlay’ and ‘AutoRun’ features. AutoPlay will show you a popup dialog whenever you insert external media (drive, CD, DVD, etc.) to choose what to do with your inserted media. AutoRun, on the other hand, …Read More »
Lesson in password security: Photo of UK’s Prince William reveals password for Royal Air Force login
You know the Duke of Cambridge, popularly known as Prince William? Yeah, well, the English monarchy likes to release photos of their royals for public relation purposes. Last week Prince William’s official website released some photos of ole William and …Read More »
French magazine L’Express is reporting that, last May, the computers in the offices of Nicolas Sarkozy (who was still president back then) were hacked by the “Flame” malware. This is that same malware that made headlines for being developed by …Read More »
Would you want Apple apps like iPhoto, iMovie, Garage Band and iWork suite on your Android advice? I know I wouldn’t mind would probably even pay for apps, assuming they are quality.
One malicious “developer” clearly thinks the same and …Read More »
Some companies, and individuals, find and disclose vulnerabilities — may those be on websites, operating systems, programs, whatever — for the betterment of society. Others do it for a “finder’s fee”. VUPEN does it so they can sell the secrets …Read More »
Ransomware is a special type of malware that locks, or claims to lock, your files and folders; then it asks you to pay a certain amount of money before you are given access back to your data. If you don’t …Read More »
Do you ever feel sorry for Adobe? I mean, yeah, it is hard to feel sorry for a multi-billion dollar corporation that likes to use closed standards and charge us for the privilege. But still, you have to feel for …Read More »
Firefox is going to start forcing HTTPS usage for sensitive websites, to thwart man-in-the-middle attacks
After reading the title of this article, you must be thinking “sounds like what HTTPS Everywhere does”. No, not exactly.
You see there are some websites out there that use HTTP Strict Transport Security (HSTS), a protocol that forces browsers …Read More »
Java, Flash, and iTunes are in the “top 10 vulnerabilities” list — Microsoft products are nowhere to be found
Kaspersky Labs, a digital security firm, releases a quarterly “IT Threat Evolution” report. For the Q3 2012 report, one section provides information as to what programs have the most widely spread vulnerabilities. I’m sure you can guess some but may …Read More »
Fake e-mail from “Microsoft Windows 8 Team” claims to give you free Windows 8 but is actually a phishing attack
We have seen many e-mail scams, ranging from e-mails that try to steal your information to e-mails that try to infect your computer with malware. In particular one fake e-mail was particularly clever because it used the cover of a …Read More »