An HP report highlights how the bulk of exploits in 2014 revolved around vulnerabilities that were discovered before 2013.
Showing results 1 to 20 of 1,016
The author of the popular free email encryption software used by whistleblower Edward Snowden has finally received a six-figure pay day after more than 17 years of maintaining the code on diminishing donations.
The software giant issued 8 patches to fix security vulnerabilities in Windows, including one considered "critical" -- the most severe rating.
Adobe patches nine vulnerabilities -- four of which are considered "critical" -- in order to protect against hackers who could exploit the bug to take control of an affected system.
Both Reader and Acrobat for Windows and Mac are vulnerable to one or more critical vulnerabilities.
IBM's reinvented email and collaboration software, dubbed Verse, comes with a Watson option where you can ask a question and get an email answer. Here's what I'd really want Watson to do for me.
The latest vector for exploits of the Shellshock bug in the Bash shell is SMTP, where the mail headers themselves trigger the exploit.
iSight says the "Sandworm" team has targeted NATO, the European Union, Ukraine and industry through a previously unrecognized Windows zero-day exploit.
Hackers are moving away from broad-based email attacks and favoring campaigns that target individual workers. A smart security solution stays ahead of the bad guys by blocking attacks as soon as they’re discovered.
Many severe vulnerabilities are fixed in the new version and remain in iOS 7.1.
On Tuesday, about the time that Microsoft issues its Patch Tuesday Windows updates, Adobe will release new versions of Reader and Acrobat.
Apple has patched an exploit with its Find My iPhone online service that may have been used by hackers to gain access to personal photos stored on iCloud accounts belonging to some 100 celebrities.
Another system on the network could take root privileges on a vulnerable Samba client or server.
A flaw in many of the company's cable modems and residential gateways could allow a remote attacker to take control of the device.
Through Project Zero, Google will pay researchers to report information about vulnerabilities in third-party programs.
[UPDATED] Still cleaning up after the Heartbleed debacle, OpenSSL is issuing fixes for several vulnerabilities, one of them exploitable to run arbitrary code on the client or server.
Australian authorities have joined a co-ordinated global crackdown on computer hackers who use software known as Blackshades for sinister purposes.
Australian businesses in the resource and mining, financial services, and telecommunications sector are the latest targets of hackers exploiting Internet Explorer zero day.
Apple acknowledged a bug in iOS that leaves email attachments vulnerable and has committed to fixing it. Luckily the bug is difficult to exploit and doesn't affect iPhone 4s and later devices running iOS 7.1.
[UPDATED] A vulnerability in Flash Player for Windows, Mac and Linux is being exploited in the wild. An update is available from Adobe (and Google and Microsoft for their browsers).
The best of ZDNet, delivered
- 1 33 ways to improve your iPhone's battery life
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 So you have an app idea and want to make a bajillion bucks