Please turn on your JavaScript for this page to function normally.
Latest IE 0-day still unpatched, attacks exploiting it go back three months

While Microsoft is yet to issue a patch for the latest Internet Explorer zero-day (CVE-2013-3893), reports are coming in that the flaw has been exploited more widely and for a …

IE 0-day attack reports push ISC to raise official threat level

Over the weekend, FireEye researchers have managed to shed some light on the in-the-wild attacks leveraging the latest discovered Internet Explorer zero-day vulnerability …

Latest IE 0-day insight: Background, severity and solutions

This recently discovered Internet Explorer zero day vulnerability is bad. Users and administrators should take immediate action to mitigate the risk. Considering the timing, I …

Microsoft issued Fix it for actively exploited IE 0-day

Microsoft has yesterday unexpectedly released a security advisory warning users about instances of active exploitation of a vulnerability found in all supported versions of …

Mobile Pwn2Own: $300k prize pool awaits successful contestants

The next Mobile Pwn2own competition is to be held in November at the PacSec Applied Security Conference in Tokyo, and contestants can earn as much as $100,000 for a successful …

Attacks targeting unsupported Java 6 are on the rise

As predicted at the end of 2012 and proved by the ever expanding use of exploit kits, vulnerabilities in popular and widespread software such as Java and Adobe’s Acrobat …

Microsoft to release 14 bulletins patching Office, Windows, IE and .NET

September’s edition of Microsoft’s patch Tuesday advance notification has emerged in all its glory. A hefty 14 bulletins are in the offing, split equally between …

Researchers detail attacks for compromising Dropbox user accounts

Dropbox, the popular file hosting service that has managed to amass over 100 million users in the five years since it was launched, has had its fair share of problems: …

Shielding targeted applications

When we discuss exploit prevention, we often talk about “targeted applications.’ This term refers to end-user applications which can be exploited by hackers for …

Compliance and security vulnerabilities are top concerns for POS systems

Without adequate controls to manage store systems and the increase in number and variety of devices – retailers can expect security costs to continue to increase …

Apple Dev Center was hacked via remote code execution bug

Apple’s ever expanding article listing researchers’ credits for finding and reporting potential security issues in Apple’s web servers has some new entries, …

Scanning the Internet in less than an hour

Scanning the Internet used to be a task that took months, but a new tool created by a team of researchers from the University of Michigan can scan all (or most) of the …

Don't miss

Cybersecurity news