TurboBackup users have been using it for backing up work, synchronizing between Laptop, Netbook, or Desktop PCs, scheduling unattended...
Showing results 1 to 20 of 181
By default, Internet Explorer on Windows client systems supports SSL version 3.0, the version recently found vulnerable to attack. Now there's another way to turn it off.
The Chinese state media attack on US software and hardware continues, with China’s CCTV state network broadcasting a critical report suggesting that Windows 8 is being used to harvest data about the country’s citizens for use by the US government.
The evidence is overwhelming: The opportunities to attack Mac users are plentiful, but nobody bothers. It's still too easy to get at Windows users. This has been obvious for some time and well-understood in the security community.
Critical vulnerabilities in Flash on Windows, Mac and Linux expose users to attack.
A long-term view is helpful when dealing with the ongoing bloodsport known as mobile operating system market share.
Anti DDoS Guardian is high performance Anti DDoS software for Windows Servers. It stops slow HTTP Get&Post attacks, layer 7 attacks,...
Users of the "hidden Internet" are advised to switch away from the world's most used operating system, amid a malware attack that some are linking to U.S. authorities.
Opera has managed to detect and stop an attack on its internal systems, but not before potentially a few thousand Windows users were put in harm's way.
Stellar Phoenix RAID Data Recovery Software - Technician (5.0) for Windows ensures you to find, address and reinstate all your lost,...
Researchers say hackers could easily spread their attack after gaining Windows passwords.
Today, one of Microsoft's Technical Fellows has published his second "geek lit" novel, Trojan Horse. It's a techno-thriller with educational value because it aims to get the technical details of global cyber-attacks right
A second cross-platform Trojan downloader has been discovered that detects if you're running Windows, Mac OS X, or Linux, and then downloads the corresponding malware for your platform. Unlike the first one, which supported PowerPC Macs, this one does Intel x86 Macs.
A new cross-platform Trojan downloader has been discovered. It detects if you're running Windows, Mac OS X, or Linux, and then downloads the corresponding malware for your platform.
Patch Tuesday: Redmond ships nine bulletins to fix 16 dangerous security holes in Microsoft Windows, Internet Explorer, Visual Basic for Applications, and Microsoft Office.
The Patch Tuesday batch for May 2012 covers at least 23 documented vulnerabilities in Microsoft Office, Microsoft Windows, the Microsoft .NET Framework and Microsoft Silverlight.
The same Java vulnerability used in the infamous Flashback malware is now being used as an attack vector for a single piece of malware that can infect both Windows and Mac OS X computers.
The vulnerability under attack exists in Windows Common Controls and can be exploited to launch remote code execution attacks if a user simply surfs to a malicious website.
The code execution attack, which required no user action beyond browsing to a rigged web site, also works on Internet Explorer v10 (consumer preview) running on Windows 8.
A design issue could allow organizations with access to powerful computers to launch an attack against MD5 to escalate rights on fully patched computers running Windows 7 or Windows Server 2008.
Is launching a distributed denial-of-service (DDoS) attack a legitimate form of protest? Who's come onto the NBN wholesale broadband agreement? What will you pay for Kinect for Windows and why are Google and Twitter punching on?
One version of the attack was triggered by a rigged Microsoft Word .doc that probably included some social engineering and required the target to open the booby-trapped file.
Microsoft continues to roll out some great games and I can't stop dropping $2 to $5 each week on these games, can you?