Attackers infected some advertisements on the eWEEK.com Web site Feb. 23 in an apparent attempt to get readers to download a rogue anti-virus application. eWEEK has found the exploit and removed the infected code from its Web site. Although the exploit involved a bug affecting Adobe Reader and Adobe Acrobat, it is not related to […]
Microsoft has confirmed that hackers are targeting a new vulnerability that could lead to arbitrary code execution. In an advisory, Microsoft described how the bug can be exploited using a specially crafted Excel document. The malicious Excel file attempts to access an invalid object, allowing the attacker to execute arbitrary code. According to Microsoft, the […]
Sybase pulled the covers off the latest version of its Sybase IQ 15 analytic server, showcasing several new features designed to deliver faster and more accurate analysis. The new edition of the column-based server builds is focused on what Sybase calls smarter analytics-essentially improving speed and manageability to help enterprises turn raw data into actionable […]
Sometimes employees walk out with more than their walking papers when they clock out for the last time. A study by the Ponemon Institute found that more than 59 percent of those surveyed kept corporate data after leaving their jobs. The survey, which was sponsored by Symantec, included responses from 945 adult employees who had […]
Microsoft has partnered with a number of hardware vendors to create a new set of reference architectures aimed at cutting the complexity associated with creating data warehouses. Microsoft officials say the Microsoft SQL Server Fast Track Data Warehouse is intended to give customers access to preconfigured industry-standard hardware from Hewlett-Packard, Dell and Bull. In addition, […]
Hackers have once again turned to PDF files to spread their wares, this time assaulting a zero-day flaw affecting Adobe Reader and Acrobat. Fortunately, the unpatched bug is on the company’s radar, and fixes for Adobe Reader 9 and Acrobat 9 are slated to be available March 11. Updates for earlier versions will come later, […]
Novell announced two moves today meant to bolster its identity and access management business. The first is the acquisition of the technology assets of compliance and user management vendor Fortefi, which Novell plans to use as the basis for the upcoming release of Novell Privileged User Manager in the second quarter of 2009. The second […]
Facial recognition technology may sound like a sexy, futuristic way to protect your laptop. But as security researcher Minh Duc Nguyen showed Feb. 19, the future is not always that bright when it comes to IT security. Nguyen’s presentation was just one of several talks at Black Hat DC. The topics at the security conference […]
Once again, hackers have had their way with a security test designed to distinguish between humans and machines. This time it was Microsoft Live Hotmail’s CAPTCHA that has fallen victim to hackers. CAPTCHA, which stands for Completely Automated Public Turing test to tell Computers and Humans Apart, is often used by Webmail services to prevent […]
While changes to Facebook’s user license agreement have been in the news of late, another issue continues to nag Facebook and other social networks-the security of applications developed by third parties. The question of what to do with potentially malicious applications created by third parties for use on social networking sites is underscored by the […]