Attacks+software

Showing results 1 to 20 of 163

August 17, 2015 By Horizon DataSys

RollBack Rx Professional

RollBack Rx Pro is an instant time machine for your PC. A Comprehensive Windows System Restore solution that empowers users and IT...

May 9, 2012 by

Microsoft patches 'Sons of Duqu' flaws

Microsoft has patched a number of software flaws that could have led to information-stealing attacks by Duqu malware, according to security company Qualys.One of the critical 'Patch Tuesday' bulletins, MS12-034, addressed multiple Microsoft products that were vulnerable to the Duqu data-stealing malware, Qualys chief technology officer Wolfgang Kandek said in a statement on Tuesday.

July 21, 2015 By Lazesoft

Lazesoft Data Recovery Home Edition

Lazesoft Data Recovery is safe, easy-to-use and powerful data recovery freeware for home users, which allows you freely recover unlimited...

April 16, 2015 By Fireebok Studio

Fireebok Data Recovery

Fireebok Data Recovery is a useful utility to recover lost data from your Mac computer. With this advanced data recovery software,...

October 12, 2011 by

Microsoft downplays significance of zero-day flaws

Only one percent of security vulnerability exploits in the first half of the year were attacks against so-called zero-day flaws, Microsoft has said.According to the software giant, 99 percent of exploits use common techniques such as social engineering and the targeting of unpatched, known vulnerabilities.

June 17, 2011 by

Homeland Security warns of China software threat

The Department of Homeland Security has issued a warning after a security researcher discovered software from a Chinese company contained bugs which hackers could exploit to launch attacks on critical infrastructure including utilities.

April 20, 2011 by

Malware authors target Google Chrome

Sorry, Windows users. Switching to a different browser than Internet Explorer won't immunize you from malware attacks. The bad guys have begun preying on that misplaced confidence to push dangerous software, including Trojans and scareware. Here's a live, very dangerous example.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular