Did Firefox listen to Facebook and just kill Flash? (No, but there’s another patch!) Source: Sophos
Did Firefox listen to Facebook and just kill Flash? (No, but there’s another patch!) Source: Sophos
The TeslaCrypt family of ransomware encryptors is a relatively new threat: its samples were first detected in February 2015. Since then the malware has been widely portrayed in mass media as the ‘curse’ of computer gamers because it targets many game-related file types (game saves, user profiles, etc.). The Trojan’s targets have included people in […]
To the usual misgivings of many Internet users, who are still suspicious about buying over the Internet, we now have to add certain security problems that have damaged the image of e-commerce. The latest worrying episode has affected the popular management software, Magento – a group of attackers has taken advantage of a crack in […]
More from Hacking Team fiasco. For the third time in a week, a zero-day vulnerability in Adobe’s Flash Player browser plugin has been discovered. This was made known after hackers dumped 400GB of documents that were stolen Hacking Team. Should we be thankful to the hackers? I leave that answer to you. Personally, I think […]
More from Hacking Team fiasco. For the third time in a week, a zero-day vulnerability in Adobe’s Flash Player browser plugin has been discovered. This was made known after hackers dumped 400GB of documents that were stolen Hacking Team. Should we be thankful to the hackers? I leave that answer to you. Personally, I think […]
For the third time in a week, researchers have discovered a zero-day vulnerability in Adobe’s Flash Player browser plugin. Like the previous two discoveries, this one came to light only after hackers dumped online huge troves of documents stolen from Hacking Team — an Italian security firm that sells software exploits to governments around the world. […]
Disasters and security incidents happen. It is a fact. The problem is that organizations are still planning a response to these situations with little time, despite the fact that most of them have been forced to use a disaster recovery plan in the past 24 months. This is shown in a study by Gartner carried […]
Last week, hacktivists posted online 400 GB worth of internal emails, documents and other data stolen from Hacking Team, an Italian security firm that has earned the ire of privacy and civil liberties groups for selling spy software to governments worldwide. New analysis of the leaked Hacking Team emails suggests that in 2013 the company used […]
A functionality of Microsoft Office that has been in use since the 1990’s can be exploited to deliver malicious, executable files to users. The security researcher who discovered it claims that widely used security software is not triggered when the executable files are run. The functionality or feature is the OLE Packager which is found […]