|
Google offers bounty on browser bugs
The online giant plans to reward security researchers and developers with $500 per bug found in the code underlying its Chrome browser. 2010-02-02 Read more ... | Comment(s) | Post Comment Cyberattacks from U.S. "greatest concern" Global IT execs worry more about cyberattacks from the United States than those from China, one survey finds. 2010-01-28 Read more ... | Comment(s) | Post Comment Microsoft patches as fraudsters target IE flaw The software company fixes eight vulnerabilities in Internet Explorer as security firms note more incidents of cybercriminals using one of the critical flaws. 2010-01-21 Read more ... | Comment(s) | Post Comment Attack on IE 0-day refined by researchers Security researchers start improving the code and publishing their own exploits for IE browser flaw, after the code is published to a malware analysis site. 2010-01-18 Read more ... | Comment(s) | Post Comment IE flaw gave attackers entry, says McAfee A remotely exploitable flaw in Microsoft's Internet Explorer allowed attackers operating from Chinese servers to infiltrate at least one company, the security firm says. 2010-01-14 Read more ... | Comment(s) | Post Comment Law firm suing China suffers attack A law firm suing China, two Chinese software developers and seven PC makers for allegedly stealing its client's code suffers several targeted attacks. 2010-01-14 Read more ... | Comment(s) | Post Comment Microsoft, Oracle, Adobe issue patches The three companies all patched critical issues on the second Tuesday of the month. 2010-01-13 Read more ... | Comment(s) | Post Comment Google, Adobe attacked through China The Internet search giant threatens to exit the Chinese market after sophisticated cyber attacks targeted Gmail. Adobe and at least two dozen others firms targeted as well. 2010-01-13 Read more ... | Comment(s) | Post Comment Cyber exercise to target financial firms A critical-infrastructure group invites all comers to participate in an exercise to pinpoint where they can improve their payment processing security. 2010-01-11 Read more ... | Comment(s) | Post Comment NIST investigates secure USB flaws The U.S. agency says that the vulnerability in several brands of secure flash drives is caused by the authorization software, not the crypto module validated by its engineers. 2010-01-11 Read more ... | Comment(s) | Post Comment |
|
Privacy Statement |