List of products affected by the vulnerable Broadcom UPnP stack
Recently, DefenseCode researchers have uncovered a high-risk Broadcom UPnP stack remote root vulnerability. The vulnerability is located within the wanipc and wanppp modules …
Fear of government snooping hinders cloud adoption
Almost half of IT experts are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, according to Lieberman …
U.S. President to decide on pre-emptive cyberstrikes
As the moment when U.S. President Barack Obama will issue a cybersecurity executive order slowly draws near, other questions that affect the nation’s cyber defense and …
None of the 100 largest e-commerce sites have fully implemented DNSSEC
The biggest brands in e-commerce are overlooking a critical security technology that could reduce the risk of identify theft and credit card fraud. An analysis of the 100 …
Japan holds first hacking contest backed by government
Despite being one of the greater world economies and being technologically advanced as few others, Japan has woken up to the reality of cyber crime relatively late. The highly …
Oracle releases MySQL 5.6
Oracle today announced MySQL 5.6, the world’s most popular open source database. With increased performance, scalability, reliability and manageability, MySQL 5.6 helps …
Ad network site hack results in popular sites flagged as malicious
Google Chrome users trying to visit a slew of popular news sites such as the New York Times, the Washington Post, ZDNet and the Huffington Post on Monday were faced with …
Fake Amazon Kindle receipt leads to persistent malware
Amazon customers buying e-books for their Kindle or other mobile devices should be careful with emails that seemingly containing receipts for their purchases, warns Webroot, …
Digital certificates and malware: a dangerous mix
In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If anything, that should remind us …
Business is booming for exploits, mobile malware
Business is thriving for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to a new threat report from F-Secure …
Cisco unveils open networking “fabric” for data centers, clouds
Network speed, latency, and greater network port density in a single unit are key considerations for customers deploying virtualized data centers and moving to a managed cloud …
Hackers breach U.S. Energy Department networks
Notifications sent out to employees and contractors of the U.S. Department of Energy have confirmed that it and its networks have been the latest victim of …