One researcher says the critical flaw is caused by a simple example.html file enclosed by default in plugin packages.
Showing results 1 to 20 of 1,006
Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to Secunia, while IBM software took 40 percent of the Top 20 places.
Internet of Things devices are not originally built to be robust against attacks, resulting in vulnerabilities that can lead to severe repercussions if left unchecked, such as data that's being collected and acted upon in Singapore's smart nation plan.
The Internet of Things opens up a world of possibilities for our connected lives. But what if a hacker could gain control of the things that mean the most to us. Here we investigate some possible hacking scenarios that could just happen.
An HP report highlights how the bulk of exploits in 2014 revolved around vulnerabilities that were discovered before 2013.
Ubuntu Linux aims to become the glue that holds the Internet of Things together with its new partnerships.
The increase of distributed denial-of-service attacks during Q4 2014 was driven by the rise of the Internet of Things, and the increasing exploitation of web vulnerabilities and botnet building.
Adobe patches nine vulnerabilities -- four of which are considered "critical" -- in order to protect against hackers who could exploit the bug to take control of an affected system.
The Windows, Mac and Linux versions of Flash Player all have critical security vulnerabilities patched in a new version.
UPDATED. I ran the numbers and vulnerabilities in browsers are up this year, as is their severity. We know more about this for Internet Explorer because Microsoft provides the most data.
A Cumulative Update for Internet Explorer fixes 37 vulnerabilities, one of which is old and publicly-disclosed, although not especially severe.
Updates released today address a total of 37 vulnerabilities in Windows, Internet Explorer, Office, SharePoint Server 2013, the .NET Framework and SQL Server.
The Wall Street Journal is a fresh target in what appears to be a renewed assult against media publications online.
UPDATED. This Patch Tuesday brings six updates but the first, a Cumulative Update for Internet Explorer, fixes 24 of the vulnerabilities.
Today's updates address 66 vulnerabilities, but 59 of them are memory corruption vulnerabilities in Internet Explorer
Microsoft has failed to address a remotely exploitable security flaw affecting the most widely used version of Internet Explorer.
Australian businesses in the resource and mining, financial services, and telecommunications sector are the latest targets of hackers exploiting Internet Explorer zero day.
With a high-profile bug so close to XP's end of support, there was very little upside for Microsoft in being strict. This sort of thing has happened before.
A new variant of the Darlloz worm focuses on manipulating home systems to mine for digital currency beyond Bitcoin.
[UPDATE] A new version of Flash fixes two vulnerabilities in the Windows, Mac and Linux versions. They're not super-high priority.
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks