Attacks+software

Showing results 1 to 20 of 148

Fireebok Data Recovery

Fireebok Data Recovery is a useful utility to recover lost data from your Mac computer. With this advanced data recovery software,...

January 3, 2015 By Fireebok Studio

Microsoft patches 'Sons of Duqu' flaws

Microsoft has patched a number of software flaws that could have led to information-stealing attacks by Duqu malware, according to security company Qualys.One of the critical 'Patch Tuesday' bulletins, MS12-034, addressed multiple Microsoft products that were vulnerable to the Duqu data-stealing malware, Qualys chief technology officer Wolfgang Kandek said in a statement on Tuesday.

May 9, 2012 by

Recover Deleted Message Guide

Messages are one of the most promising modes of communication through mobile phone. You can easily pick your phone and write it and...

December 24, 2014 By cpmarkets

Lazesoft Data Recovery Home

Lazesoft Data Recovery Just a few clicks, you can use it to recover deleted files and recover data from formatted, damaged or lost...

July 22, 2014 By Lazesoft

Microsoft downplays significance of zero-day flaws

Only one percent of security vulnerability exploits in the first half of the year were attacks against so-called zero-day flaws, Microsoft has said.According to the software giant, 99 percent of exploits use common techniques such as social engineering and the targeting of unpatched, known vulnerabilities.

October 12, 2011 by

Homeland Security warns of China software threat

The Department of Homeland Security has issued a warning after a security researcher discovered software from a Chinese company contained bugs which hackers could exploit to launch attacks on critical infrastructure including utilities.

June 17, 2011 by

Malware authors target Google Chrome

Sorry, Windows users. Switching to a different browser than Internet Explorer won't immunize you from malware attacks. The bad guys have begun preying on that misplaced confidence to push dangerous software, including Trojans and scareware. Here's a live, very dangerous example.

April 20, 2011 by

Operation 'Avenge Assange': How anonymous is 'Anonymous'?

A report by the University of Twente, Netherlands, proves that 'Anonymous' attackers who hit Visa, Mastercard and PayPal, are not at all anonymous due to the lack of IP-spoofing capabilities in the software used to carry out the attacks.

December 15, 2010

HD Moore: Critical bug in 40 different Windows apps

Metasploit's HD Moore was in the midst of researching the recently patched LNK (Windows shortcut) vulnerability when he stumbled upon a serious problem that exposes more than 40 different Windows software programs to remote code execution attacks.

August 19, 2010 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories