Please turn on your JavaScript for this page to function normally.
Panda Cloud Internet Protection 3.2 released

Panda Cloud Internet Protection 3.2 includes monitoring and control of P2P protocols, even when encrypted, and protection for exploitable browser vulnerabilities. It also …

Facebook bug compromises top pages

A customer of Sendible, an online marketing service for promoting and tracking brands through the use of social media, e-mail and SMS messaging, has inadvertently discovered a …

Security vendor launches bug bounty

Barracuda Networks announced their Security Bug Bounty Program, an initiative that rewards researchers who identify and report security vulnerabilities in the company’s …

Microsoft November Patch Tuesday bottom line

In the video below, Amol Sarwate, vulnerability labs manager at Qualys discusses this month’s Microsoft Patch Tuesday release. To learn more about patching challenges …

Adobe patches Flash vulnerabilities

Critical vulnerabilities have been identified in Adobe Flash Player 10.1.85.3 and earlier versions for Windows, Macintosh, Linux, and Solaris, and Adobe Flash Player 10.1.95.1 …

New IE 0-day exploit code found in the wild

Exploit code for a previously unknown Internet Explorer zero-day vulnerability that would allow an attacker to perform a remote code execution and install malware on the …

New vulnerability impacts Internet Explorer users

Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code …

Google Android vulnerabilities

A shocking number of high-risk security flaws in Google’s Android smartphone OS have recently been discovered by security firm Coverity. “We found 88 high-risk …

New 0-day flaw in Flash Player exploited in the wild?

Bad news just keep piling on Adobe – it looks like there is a new zero-day vulnerability in their Flash Player that is being exploited in the wild. Its existence is …

iOS security loophole allows access to passcode-protected iPhone

A security hole in Apple iOS 4.1 allows anyone to bypass the passcode screen and access certain functions of the iPhone. To do that, you must hit the “Emergency …

Fabric weaves security into program code

Wouldn’t it be wonderful if we could build security into a program as it is written? This idea spurred a number of researchers from Cornell University to try and develop …

Apple resolves FaceTime security flaw

A flaw in the beta version of Apple’s FaceTime for Mac which was presented on Wednesday, has apparently allowed potential hackers to gain access to and modify a …

Don't miss

Cybersecurity news