The Ultimate Hacking Reference!This application details various different hacking methods, exploits, software attacks and more! If...
Showing results 1 to 20 of 59
Hewlett-Packard exec says developers' poor grasp of security practices when building cloud-based enterprise software could lead to code having loopholes hackers can exploit.
Microsoft is about to crack down on software pirates who exploit its generous MSDN and TechNet programs. If you're a current subscriber, you may get caught in the crossfire.
The company has fixed updates to its Forefront and Security Essentials security software that falsely identified Google's home page as serving the Blackhole exploit kit
Intel is increasingly focusing on software as advances in chip architecture require sophisticated software apps to exploit their power.
The Department of Homeland Security has issued a warning after a security researcher discovered software from a Chinese company contained bugs which hackers could exploit to launch attacks on critical infrastructure including utilities.
ZenOK Free Antivirus 2012 is a full-featured data protection suite. The multi-layered protection block viruses, spyware, Facebook trojans,...
Malicious hackers are using rigged Microsoft Excel files to exploit a zero-day flaw in Adobe's ubiquitous Flash Player software.
Adobe's implementation of a new sandbox (Protected Mode) in the newest version of its PDF Reader software leaves significant "residual risk" for cyber-attackers to exploit.
Microsoft reports an unprecedented wave of attackes to exploit vulnerabilities in Oracle's Jave software in the last nine months.
Attackers have used a freely available exploit to target a number of 64-bit Linux machines, according to a Linux patch management software firm.
Open source human resource management software vendor sees quality of service and mobile technology as two key areas to exploit to become a US$1 million company by 2011, reveals CEO.
Intel is moving up the stack to provide software and services alongside its processors, but an analyst thinks this will not leave room in the chips market for AMD to exploit.
Foxit Corp has added new security features to its alternative PDF reader software to help thwart recent malware attacks that exploit the "/launch" feature.
update Software developers "moving aggressively" into cloud computing to exploit opportunities in spite of landscape that's still dominated by vendor lock-in issues, says IBM exec.
Adobe's security response team is scrambling to deal with the release of exploit code for what appears to be a critical zero-day flaw in the Adobe Illustrator CS4 software product.
Through the growth of an online cultural phenomenon such as FarmVille, the game creators must have made millions. What is their killer feature in their business? And how could other software developers exploit this?
A buffer overflow exploit for the Chinese censorware is circulating online, as university researchers warn the software remains vulnerable to a flaw
Hackers are trying to exploit an unpatched vulnerability in the Office software, leading Microsoft to issue a warning and workarounds
Attackers are using rigged PowerPoint files to exploit an unpatched vulnerability in Microsoft's presentation software, according to warning late Thursday from the software maker.In a pre-patch advisory, Microsoft described the attacks as "limited and targeted," the kind of language that suggests it is being used to steal data from corporate or government networks.
In a post-McColo, post-Atrivo and post-EstDomains cybercrime ecosystem, the researchers at FireEye have recently launched a "Bad Actors series" aiming to put the spotlight on some of the currently active badware actors online. The sampled ISPs represent safe heavens for drop zones for banker malware, DNSChanger malware, rogue security software and live exploit URLs.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)