A newly discovered hole in Google Chrome's built-in sandbox protection could lead to a remote code execution, according to Acros Security.
Researchers last week described a cipher-block chaining (CBC) attack via the XML Encryption standard that could compromise secure online transactions
- By William Jackson
- 10/25/2011
A Trojan apparently being used to gather information for a future Stuxnet-style attack, was found in European industrial systems, according to Symantec.
- By Kevin McCaney
- 10/20/2011
According to a newly released security advisory report out of Georgia Tech, attacks against smartphone applications and browsers will continue to rise as the adoption of tablets and smartphones increase.
Google's contract to provide the city of Los Angeles with cloud-based applications faces completion issues after nearly two years.
The Homeland Security and Commerce departments are evaluating a list of possible voluntary industry standards that may be implemented to combat malicious networks of compromised computers controlled by online criminals.
- By William Jackson
- 10/14/2011
New security evasion techniques can be used to get through firewalls, researchers contend.
- By William Jackson
- 10/12/2011
Microsoft today released its October Security Bulletin, which includes eight bulletins that address 23 vulnerabilities -- with two bulletins labeled "critical" and six "important."
Zero-day software vulnerabilities may be alarming, but a new report from Microsoft sees them as not the biggest risk for organizations and PC users.
Microsoft released information on eight patches in its advanced notification of the October monthly security bulletin.
- By Jabulani Leffall
- 10/06/2011
The Government Accountability Office has released a report showing that security incidents at 24 federal agencies have increased 650 percent during the last five years.
- By Alice Lipowicz
- 10/04/2011
A team at the National Institute of Standards and Technology have come up with a new mapping procedure to quantify cyber threats.
- By William Jackson
- 10/04/2011
The updated service features impressive remote-management and deployment capabilities.
- By Derek Schauland
- 10/01/2011
Microsoft released Security Advisory 2588513 yesterday, which advises users of the threat of attack caused by a flaw in the Secure Socket Layer (SSL) 3.0 and Transport Layer Security (TLS) 1.0.
Final rules have been adopted and published for the Federal Communications Commission Net Neutrality policy, which goes into effect Nov. 20.
- By William Jackson
- 09/26/2011
Microsoft addressed a claim that Windows 8 will not allow Linux operating systems to coexist in a dual-boot configuration on PCs.
Six months after Microsoft, in conjunction with local and federal law enforcement, began targeting the Rustock spybot network, it is now handing its case and evidence to the Federal Bureau of Investigation.
Welcome to the inaugural Freebie Friday, the Redmondmag.com feature that will highlight some of the best current Microsoft products, from software to ebooks, that won't cost you a cent.
Adobe acted to address a zero-day vulnerability in its Flash Player 10 and lower versions by issuing a a "critical" patch on Wednesday.
- By Editorial Staff
- 09/22/2011
Attacks based on an implementation flaw of the Secure Sockets Layer (SSL) cryptographic protocol will be demonstrated on Friday by two security researchers.