Attacks+technology

Showing results 1 to 20 of 67

Microsoft patches 'Sons of Duqu' flaws

Microsoft has patched a number of software flaws that could have led to information-stealing attacks by Duqu malware, according to security company Qualys.One of the critical 'Patch Tuesday' bulletins, MS12-034, addressed multiple Microsoft products that were vulnerable to the Duqu data-stealing malware, Qualys chief technology officer Wolfgang Kandek said in a statement on Tuesday.

May 9, 2012 by

AVG urges mandatory cybercrime reporting

Governments should require mandatory reporting of cybercrime to draw attention to the constant large-scale attacks on banking customers, according to Yuval Ben-Itzhak, the chief technology officer of security vendor AVG.

June 21, 2011

Intel develops hardware-based zero-day defence

Chipmaker Intel is developing a security technology that its chief technology officer has claimed will defend against zero-day attacks at a hardware level.The technology will not be signature based and will be hardware based, Intel's chief technology officer Justin Rattner told Computerworld on Wednesday.

January 26, 2011 by

Microsoft issues emergency patch for IE

Microsoft released an emergency patch to protect Internet Explorer users from a hole in technology used to build ActiveX controls and other web application components that has been targeted in attacks.

July 28, 2009 by

Mozilla tackles XSS vulnerabilities with new technology

Mozilla's security engineers are working on new technology that promises to mitigate a large class of Web application vulnerabilities, especially the cross-site scripting (XSS) plague against modern Web browsers.The project, called Content Security Policy, is designed to shut down XSS attacks by providing a mechanism for sites to explicitly tell the browser which content is legitimate.

June 22, 2009 by

IBM chides security researchers

Technology giant IBM has taken independent security researchers to task for their role in making information about unpublished computer attacks available in an undisciplined manner.

July 30, 2008 by

Attacks on NFC mobile phones demonstrated

Yesterday, Collin Mulliner of the trifinite.group, a group of computer experts researching insecurities in wireless communications, has released the slides as well as the research tools he came up with in order to demonstrate various attacks and vulnerabilities in Near Field Communication mobile phones, a technology that will change the face of mobile payments, and naturally result in more innovative mobile phishing and malware attempts.

May 28, 2008 by

Haephrati technique used to crack US research lab

The New York Times is reporting that they obtained a copy of a report from US-CERT that attacks eminating from Chinese IP addresses successfully targeted employees of Oak Ridge National Laboratory in Tennessee. In addition to research in energy, nanotechnology and "isotope production", Oak Ridgeprovides federal, state and local government agencies and departments with technology and expertise to support national and homeland security needs.

December 10, 2007 by

VoIP security? Encrypt, encrypt, encrypt

On our sister site TechRepublic, IT Security blogger Tom Olzak runs a guest column from technology and security author-consultant Deb Shinder.In her piece "VoIP threats: beyond eavesdropping," Deb runs through a list of VoIP security vulnerabilities: Denial of Service attacks, flooding and logic attacks, injected messages, call hijacking, and caller ID spoofing.

July 16, 2007 by

Budget: E-security gets $13.6m boost

The federal government will spend AU$13.6 million over the next four years trying to protect consumers and businesses from "sophisticated and targeted attacks", according to the Minister for Communications, Information Technology and the Arts, Senator Helen Coonan.

May 8, 2007 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories