Adobe has updated its advisory from earlier this week warning users of another Flash zero-day bug with the expected patch timing. Adobe will update Flash Player 10.2.153.1 and earlier for Windows, Mactintosh, Linux and Solaris on April 15, but the Google Chrome update will be available from Google by April 14, Adobe’s Product Security Incident […]
U.S. law enforcement authorities won another battle against international cyber-crime as it shut down a botnet that controlled more than 2 million computers around the world and stole millions of dollars from its victims. A civil complaint against the criminals behind the botnet has also been filed. The Coreflood Trojan infected user computers and transferred […]
SafeNet has unveiled migration bundles to provide organizations with a full-fledged authentication platform as an alternative to what they currently have deployed. SafeNet’s trusted authentication system is flexible enough to support enterprises regardless of whether they want to deploy hardware or software tokens, smart cards or even mobile devices, the company said April 13. SafeNet […]
Scammers have been taking advantage of Facebook’s photo-tagging capability to get their spam links in front of as many people as possible. There’ve been several scams recently on Facebook where users discover their friends have tagged them on a photo. This is not malicious in itself, since that’s what friends often do. However, when the […]
Hewlett-Packard expanded its security solutions with a new real-time analysis tool based on the company’s Fortify acquisition. The new HP Fortify Real-Time Hybrid Analysis allows organizations to discover the root cause of software vulnerabilities by observing attacks in real time, HP said April 12. With real-time analysis, organizations can proactively reduce business risk and minimize […]
An intruder broke into WordPress.com and gained access to multiple servers and the source code that powers blogs for its VIP customers, including CNN, CBS, Flickr and TED. This attack follows a distributed-denial-of-service attack that knocked WP offline last month. The “low-level” break-in on several WordPress.com servers gave the attacker the highest level of access […]
Two prominent Senators introduced a bi-partisan Internet privacy bill to define some rules governing how Web companies can collect information about its users. The 2011 Commercial Privacy Bill of Rights Act co-sponsored by Sen. John F Kerry of Massachusetts and Sen. John McCain of Arizona would force Web companies to clearly explain to their Internet […]
For the second time in four weeks, Adobe warned users of a critical vulnerability in its Flash Player that could potentially allow an attacker to take remote control of the compromised system. Attackers are exploiting the latest Flash Player bug by embedding malicious Flash files within a Microsoft Word document that is emailed to users […]
The Texas Comptroller’s Office has disclosed that sensitive personal information belonging to at least 3.5 million residents haw been accidentally exposed, adding more uncertainty about phishing attacks and identity theft to people already jittery after Epsilon. Social Security numbers, birthdates, driver’s license numbers, addresses and other personal information belonging to 3.5 million residents were posted […]
Microsoft released 17 security bulletins, including nine that are rated “Critical” and eight rated “Important” as part of its April Patch Tuesday update on April 12. Fifteen of the bulletins address vulnerabilities that allow attackers to remotely execute code. Not only is this the biggest Patch Tuesday for 2011, it is the largest to date […]