Attacks+software

Showing results 1 to 20 of 148

Lazesoft Data Recovery Home

Lazesoft Data Recovery Just a few clicks, you can use it to recover deleted files and recover data from formatted, damaged or lost...

July 22, 2014 by Lazesoft

Microsoft patches 'Sons of Duqu' flaws

Microsoft has patched a number of software flaws that could have led to information-stealing attacks by Duqu malware, according to security company Qualys.One of the critical 'Patch Tuesday' bulletins, MS12-034, addressed multiple Microsoft products that were vulnerable to the Duqu data-stealing malware, Qualys chief technology officer Wolfgang Kandek said in a statement on Tuesday.

May 9, 2012 by

Fireebok Data Recovery

Fireebok Data Recovery for Mac is an useful utility to recover lost data from any Mac OS X based media. With this advanced data recovery...

May 25, 2014 by Fireebok Studio

PPTX Viewer Tool

PPTX files of Microsoft Outlook contain presentations composed of texts, images, sounds and embedded objects of all sorts. These files...

October 13, 2013 by Viewer Tool

Microsoft downplays significance of zero-day flaws

Only one percent of security vulnerability exploits in the first half of the year were attacks against so-called zero-day flaws, Microsoft has said.According to the software giant, 99 percent of exploits use common techniques such as social engineering and the targeting of unpatched, known vulnerabilities.

October 12, 2011 by

Homeland Security warns of China software threat

The Department of Homeland Security has issued a warning after a security researcher discovered software from a Chinese company contained bugs which hackers could exploit to launch attacks on critical infrastructure including utilities.

June 17, 2011 by

Malware authors target Google Chrome

Sorry, Windows users. Switching to a different browser than Internet Explorer won't immunize you from malware attacks. The bad guys have begun preying on that misplaced confidence to push dangerous software, including Trojans and scareware. Here's a live, very dangerous example.

April 20, 2011

Operation 'Avenge Assange': How anonymous is 'Anonymous'?

A report by the University of Twente, Netherlands, proves that 'Anonymous' attackers who hit Visa, Mastercard and PayPal, are not at all anonymous due to the lack of IP-spoofing capabilities in the software used to carry out the attacks.

December 15, 2010

HD Moore: Critical bug in 40 different Windows apps

Metasploit's HD Moore was in the midst of researching the recently patched LNK (Windows shortcut) vulnerability when he stumbled upon a serious problem that exposes more than 40 different Windows software programs to remote code execution attacks.

August 19, 2010 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories