'Covert Redirect' vulnerability affects OAuth 2.0, OpenID 
 
Exploit stops, pops security scanner  
By Darren Pauli | May 1, 2014 | Comment Now 
Pirate hackers have weapons turned against them.
 
Windows XP users at risk with new IE exploit 
By Darren Pauli | Apr 28, 2014 | Comment Now 
No fix for those on unsupported OS.
 
Security flaw believed to affect all Android devices 
By Tim Ring | Mar 24, 2014 | Comment Now 
Indiana Uni, Microsoft researchers discover vulnerability.
 
Adobe patches critical Flash, Reader, Acrobat vulnerabilities 
 
Fresh Java exploit has ties to Bit9 attack 
By Dan Raywood | Mar 5, 2013 | Comment Now 
Pings the same command and control server.
 
Apple hit by hackers who targeted Facebook 
By Jim Finkle, Joseph Menn | Feb 20, 2013 | Comment Now 
Java vulnerability exploited in new wave of attacks.
 
Samsung, Dell printers remotely exploitable 
By Juha Saarinen | Nov 29, 2012 | Comment Now 
Vulnerability has existed since 2004.
 
New critical Oracle Java vulnerability found 
By Juha Saarinen | Sep 26, 2012 | Comment Now 
Turn off browser plug-ins... again.
 
US warns of hole in control system routers 
By Juha Saarinen | Aug 23, 2012 | Comment Now 
Power plants, railway switches at risk.
 
More than 100 e-commerce sites vulnerable to shopping cart flaw 
By Dan Raywood | Aug 6, 2012 | Comment Now 
Lack of patching leaves companies exposed.
 
Security bug keeps ICANN gTLD grounded 
By Liam Tung | Apr 24, 2012 | Comment Now 
Applicant filenames exposed.
 
Wicked exploit found in Linux WiFi 
By Darren Pauli | Apr 12, 2012 | Comment Now 
Anonymous student hacker finds holes in WICD tool.
 
RDP proof of concept triggers blue screen of death 
By Darren Pauli | Mar 16, 2012 | Comment Now 
Proof of concept kills Windows machines.
 
Hackers post bounty for RDP exploit 
By Dan Kaplan | Mar 16, 2012 | Comment Now 
HD Moore chips in for Metasploit module.
 
RDP flaw a harbinger of breaches  
By Darren Pauli | Mar 14, 2012 | Comment Now 
Small businesses most at risk from dangerous vulnerability.
 
Flaw lets crooks rob Google Wallets 
By Stephen Lawton | Feb 15, 2012 | Comment Now 
Google kills Android app "as a precaution".
 
Bug means iPhone thieves get iMessages, too 
By Darren Pauli | Feb 6, 2012 | Comment Now 
iMessages relayed to strangers' iPhones.
 
Thousands of WordPress sites sucked into BlackHole 
By Darren Pauli | Nov 1, 2011 | Comment Now 
Exploits aging TimThumb vulnerability.
 
Researcher discloses vulnerability to firm, gets police visit 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  23%
 
Application integration concerns
  3%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 554

Vote