Bug bounty program outs 7-month-old IE zero-day
An HP bug bounty program has published information about a critical vulnerability in Internet Explorer 8 because Microsoft did not meet its patch-or-we-go-public deadline.
An HP bug bounty program has published information about a critical vulnerability in Internet Explorer 8 because Microsoft did not meet its patch-or-we-go-public deadline.
At least one of Microsoft's Patch Tuesday updates looks like an excellent candidate to hackers as they poke around for bugs in the now-retired Windows XP.
Microsoft will issue eight security updates to customers next week that will include fixes for Internet Explorer, Windows, Office and SharePoint.
Microsoft shipped an emergency update for Internet Explorer to close a hole that hackers had already been exploiting, and in an unexpected move, allowed Windows XP machines to receive the update.
Microsoft has informed customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using "drive-by" attacks.
As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week.
Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.
Microsoft's support for WIndows XP ends in less than four months, and the company has warned users repeatedly that it's time to move on. But a lot of them are sticking with the aged OS. And for Microsoft, that's a problem.
Alberto Yusi Lajud Pena, found dead in the Dominican Republic two weeks ago, was the leader of the New York cell of an international gang of cyber thieves that authorities allege stole a staggering $45 million from ATM machines around the world.
Cyberattacks have evolved to become much more complex, however the core techniques employed by malware are usually recycled and largely unchanged. <p> Find out how these targeted attacks affect companies in real world cases and why legacy solutions that focus on detection are insufficient to protect secure enterprise data. Included are also 10 preventative measures you can take to prevent a corporate security breach.