The flaw can be exploited to conduct denial-of-service attacks or remote hijacking.
Showing results 1 to 20 of 38
Researchers are warning genuine apps can be easily replaced with fake apps, which can be used to vacuum up a smartphone user's entire store of data.
How do you fix a major security flaw that could lead to attackers hacking into hundreds of millions of SIM cards? By getting the carriers to hack into them first.
Yahoo today announced it has fixed the security vulnerability responsible for 450,000 of its accounts being compromised. The company says it is still in the process of notifying affected users.
The exploit was triggered against a use-after-free vulnerability in the open-source browser and successfully evaded DEP and ALSR, two anti-exploit mitigations built into the Windows operating system.
Vulnerabilities in Network Building Mediator allow hackers to see passwords, intercept communications and modify configuration without admin privileges
According to Apple's advisory accompanying the patch, the actual vulnerability was not in the Safari browser but in the way ATS (Apple Type Services) handles certain fonts.
A serious, unpatched security flaw has surfaced in Adobe Illustrator, as the software maker prepares to release critical security fixes for next week
The software, which allows Windows apps to run on Macs, has flaws that could allow an attacker to hack into a user's system or cause a malfunction
A flaw in the music software could allow a hacker to take over Windows and Mac machines remotely
Ten holes in Apple's smartphone operating system and media player software could leave owners open to hacking and phishing attacks
The intelligence agency has closed up a cross-site scripting vulnerability on its website after details of the flaw were published on a hacker forum
This is the cleverest solution I've seen to the one thing that annoys me about the otherwise-fabulous Panasonic Lumix DMC-LX3 (i.e., that ridiculous lens cap).
The first attacks that are likely to have stemmed from a serious Domain Name System flaw have been reported.
Notable headlines:Ryan Naraine: Zero-day flaw haunts Internet ExplorerTech heavyweights launch security response consortiumICANN and IANA's domains hijacked by Turkish hacking groupSecurity researchers hack the London underground train for free rideMatthew Miller: First public beta of Opera Mobile 9.
Apple has released another round of security patches for its Web browser this week, targeting a vulnerability which allowed a Macbook air to be hacked and two deficiencies in the Windows-only version of the software.
Apple's Leopard has been hacked within 30 seconds using a flaw in Safari, with rival OSes Ubuntu and Vista so far remaining impenetrable in the CanSecWest PWN to OWN competition.
Web application vulnerabilities are simple to fix -- but they're here to stay and will likely get worse, say security analysts.
Three days after ethical hacker Petko Petkov announced his discovery of a cross-site scripting vulnerability in Gmail, Google says it has fixed the problem.
A flaw affecting eight vendors' Universal Threat Management (UTM) security appliances was identified by US-based security firm Calyptix last week.
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks