HomeCybersecurity

Cybersecurity

E-Mail Scam Dupes Linux Users

Red Hat Inc. on Saturday warned users of an e-mail scam designed to plant malicious code on users systems. The malicious e-mail poses as...

Malicious Mac OS X Script Poses Threat

A malicious script for Apple Computer Inc.s Mac OS X has been discovered that is capable of harvesting passwords and installing remote control software...

Sesame Networks Tackles Wi-Fi Guest Security

Canadian Wi-Fi network company Sesame Networks makes its U.S. debut Monday with a security product designed to enable secure guest access to the Internet...

Web Desktop Moves Raise Security Alerts

A pair of phishing vulnerabilities this week targeted at Google Inc. point to the kind of new threat Web companies can face as they...

Bad Input Bombs Your Program

One of the famous arguments for open-source software, made in "The Cathedral and the Bazaar" by Eric S. Raymond, is, "Given enough eyeballs, all...

Another Phishing Hole Found in Google

Google Inc. said on Thursday it fixed a flaw in its site that could allow outsiders to launch phishing attacks based on Googles familiar...

Latest Linux Vulnerabilities Get Patches

A series of recently announced security flaws open Linux and related technologies to attacks ranging from denials of service and local exploits to the...

Symantec Preps Anti-Spyware Launch as Revenue Climbs

Executives at security solutions provider Symantec said theyre confident that the companys business will continue to thrive in the face of Microsofts Windows XP...

Hack at UC Berkeley Potentially Nets 1.4 Million SSNs

Hackers took advantage of a known vulnerability on an unpatched computer to potentially gain access to some 1.4 million names, Social Security numbers, telephone...

IE Exploit Lets Attackers Plant Programs on SP2

A security researcher has discovered a new exploit for Microsoft Corp.s Windows XP Service Pack 2 that allows programs to be planted and executed...