Attacks+software

Showing results 1 to 20 of 163

Fireebok Data Recovery

Fireebok Data Recovery is a useful utility to recover lost data from your Mac computer. With this advanced data recovery software,...

April 16, 2015 By Fireebok Studio

Microsoft patches 'Sons of Duqu' flaws

Microsoft has patched a number of software flaws that could have led to information-stealing attacks by Duqu malware, according to security company Qualys.One of the critical 'Patch Tuesday' bulletins, MS12-034, addressed multiple Microsoft products that were vulnerable to the Duqu data-stealing malware, Qualys chief technology officer Wolfgang Kandek said in a statement on Tuesday.

May 9, 2012 by

Lazesoft Data Recovery Home

Lazesoft Data Recovery is safe, easy-to-use and powerful data recovery freeware for home users, which allows you freely recover unlimited...

March 10, 2015 By Lazesoft

PPTX Viewer Tool

PPTX files of Microsoft Outlook contain presentations composed of texts, images, sounds and embedded objects of all sorts. These files...

October 13, 2013 By Viewer Tool

Microsoft downplays significance of zero-day flaws

Only one percent of security vulnerability exploits in the first half of the year were attacks against so-called zero-day flaws, Microsoft has said.According to the software giant, 99 percent of exploits use common techniques such as social engineering and the targeting of unpatched, known vulnerabilities.

October 12, 2011 by

Homeland Security warns of China software threat

The Department of Homeland Security has issued a warning after a security researcher discovered software from a Chinese company contained bugs which hackers could exploit to launch attacks on critical infrastructure including utilities.

June 17, 2011 by

Malware authors target Google Chrome

Sorry, Windows users. Switching to a different browser than Internet Explorer won't immunize you from malware attacks. The bad guys have begun preying on that misplaced confidence to push dangerous software, including Trojans and scareware. Here's a live, very dangerous example.

April 20, 2011 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories