|
Hopes high for Windows 7 security
Experts hope that Microsoft's focus on making Windows security more friendly will help secure the operating system's users. 2009-10-23 Read more ... | Comment(s) | Post Comment Rapid7 snaps up the Metasploit Project The vulnerability management firm acquires the exploit framework project and hires the development team, including founder HD Moore. 2009-10-22 Read more ... | Comment(s) | Post Comment ChoicePoint allows data breach, again The consumer-data broker turns off a critical security measure, allowing unauthorized searches of its database and exposing 13,750 people to identity fraud, the Federal Trade Commission says. 2009-10-20 Read more ... | Comment(s) | Post Comment Microsoft flaw sends Mozilla scrambling The software giant plugs a critical vulnerability in a plug-in that it silently installed on Firefox users' systems in May. 2009-10-20 Read more ... | Comment(s) | Post Comment Microsoft to give investigators free COFEE The software giant plans to make the forensics toolkit available to all law enforcement to ease the collection of digital evidence at crime scenes. 2009-10-15 Read more ... | Comment(s) | Post Comment Adobe to patch exploited Acrobat flaw The company plans to fix a vulnerability currently being used to compromise computers in its forthcoming quarterly patch. 2009-10-12 Read more ... | Comment(s) | Post Comment Phishing scam exposes Hotmail passwords Microsoft warns users that thousands of customer credentials were exposed on a third-party site, apparently the result of a phishing campaign. 2009-10-06 Read more ... | Comment(s) | Post Comment Spam gets meatier as attached files grow The overall volume of bad bits transported across the Internet soars in 2009, as image spam and virus-laden e-mail messages become common. 2009-10-05 Read more ... | Comment(s) | Post Comment Firefox feature looks to foil XSS attacks Mozilla releases a preview version of its browser that implements Content Security Policy, a feature that could make scripting attacks more difficult. 2009-10-01 Read more ... | Comment(s) | Post Comment Firms most often infected by smaller botnets While the big botnets get the media attention, smaller collections of compromised PCs are more commonly found inside infected corporate networks. 2009-09-30 Read more ... | Comment(s) | Post Comment |
|
Privacy Statement |