OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
'Covert Redirect' vulnerability affects OAuth 2.0, OpenID 
 
Exploit stops, pops security scanner  
By Darren Pauli | May 1, 2014 | Comment Now 
Pirate hackers have weapons turned against them.
 
Windows XP users at risk with new IE exploit 
By Darren Pauli | Apr 28, 2014 | Comment Now 
No fix for those on unsupported OS.
 
Security flaw believed to affect all Android devices 
By Tim Ring | Mar 24, 2014 | Comment Now 
Indiana Uni, Microsoft researchers discover vulnerability.
 
Adobe patches critical Flash, Reader, Acrobat vulnerabilities 
 
Fresh Java exploit has ties to Bit9 attack 
By Dan Raywood | Mar 5, 2013 | Comment Now 
Pings the same command and control server.
 
Apple hit by hackers who targeted Facebook 
By Jim Finkle, Joseph Menn | Feb 20, 2013 | Comment Now 
Java vulnerability exploited in new wave of attacks.
 
Samsung, Dell printers remotely exploitable 
By Juha Saarinen | Nov 29, 2012 | Comment Now 
Vulnerability has existed since 2004.
 
New critical Oracle Java vulnerability found 
By Juha Saarinen | Sep 26, 2012 | Comment Now 
Turn off browser plug-ins... again.
 
US warns of hole in control system routers 
By Juha Saarinen | Aug 23, 2012 | Comment Now 
Power plants, railway switches at risk.
 
More than 100 e-commerce sites vulnerable to shopping cart flaw 
By Dan Raywood | Aug 6, 2012 | Comment Now 
Lack of patching leaves companies exposed.
 
Security bug keeps ICANN gTLD grounded 
By Liam Tung | Apr 24, 2012 | Comment Now 
Applicant filenames exposed.
 
Wicked exploit found in Linux WiFi 
By Darren Pauli | Apr 12, 2012 | Comment Now 
Anonymous student hacker finds holes in WICD tool.
 
RDP proof of concept triggers blue screen of death 
By Darren Pauli | Mar 16, 2012 | Comment Now 
Proof of concept kills Windows machines.
 
Hackers post bounty for RDP exploit 
By Dan Kaplan | Mar 16, 2012 | Comment Now 
HD Moore chips in for Metasploit module.
 
RDP flaw a harbinger of breaches  
By Darren Pauli | Mar 14, 2012 | Comment Now 
Small businesses most at risk from dangerous vulnerability.
 
Flaw lets crooks rob Google Wallets 
By Stephen Lawton | Feb 15, 2012 | Comment Now 
Google kills Android app "as a precaution".
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 774

Vote