Oracle’s bad Java week got worse on Wednesday, after it was announced that a previously unknown flaw in the programming …
‘Red October’ cyber espionage network discovered
A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since …
Microsoft responds to Internet Explorer vulnerability
Microsoft will deviate from its regular Internet Explorer repair schedule today by releasing a patch for older versions of its …
Trojan disguised as latest Chrome update
Following Google’s recent upgrade of Chrome, a new wave of bogus updates has been set upon the Internet by cyber …
Is Iran really behind recent stream of DDoS bank attacks?
Though U.S. officials have consistently blamed Iran for the ongoing stream of distributed denial of service attacks (DDoS) against major …
12 security resolutions for 2013
Among your typical New Year’s resolutions–lose weight, stop smoking, be happier–you should consider making some pledges to better secure your …
Oracle to stop patching Java 6 in Feb
Java 6 will be retired from security support in less than two months, and users and businesses should prepare now …
Adobe to patch 2-year-old Shockwave vulnerability in Feb
Adobe plans in February to close a dangerous hole in its Shockwave application that causes the application to be downgraded …
Top data privacy agency launches Microsoft investigation
Europe’s top data privacy agency has launched a formal investigation into Microsoft’s privacy policy. Microsoft confirmed on Tuesday that it …
Costly cyber espionage on ‘relentless upward trend’
Cyber espionage is nothing new. So a report from the Defense Security Service (DSS) about efforts in foreign countries to …
Iran struck by cyberattack similar to April’s oil hit
Iran’s national CERT has warned of a new type of data-wiping malware that bears some of the hallmarks of a cyberattack that severely …
Android botnet abuses people’s phones for SMS spam
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially …
Top 10 tech stories of 2012
Change in any industry involves conflict. Evolution and revolution in tech this year took place not only in the marketplace …
Researchers show proof-of-concept Microsoft ERP hack
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting …
Apple taps up former Microsoft hacker to work on Mac OS X
Apple has quietly hired Kristin Paget, a former Microsoft security expert who worked as a hacker for the company to …
ESET sends out security warning to online Christmas shoppers
ESET Middle East has sent out a warning to consumers advising them to be extra cautious and alert when shopping online this …
Symantec – Security and storage predictions for 2013
In 2012 mobility, virtualisation and cloud computing were three big trends that affected change in the way organisations across the …
91% of targeted attacks from ‘spearphishing’ emails, says Trend Micro
After gathering analysis of targeted attack data collected between February and September this year, Trend Micro found that 91 percent …
Security without compromising performance
IT managers in corporate and mid-size businesses have to balance both network performance and network security concerns. While security requirements …
Fedora 18 finally makes beta
After a number of delays, the beta of the Fedora 18 Linux-based distribution has been released. The beta release date …