Apple plugs 17 holes in Java for Snow Leopard and Lion
Apple has fixed 17 vulnerabilities in Java for OS X Snow Leopard and Lion, a move that brings the Mac operating systems up to date with Oracle’s Java SE 6 update 29.
More results...
Apple has fixed 17 vulnerabilities in Java for OS X Snow Leopard and Lion, a move that brings the Mac operating systems up to date with Oracle’s Java SE 6 update 29.
The newest version of Firefox plugs eight security holes, including five that are rated as critical and three as high.
An intermediate web certificate authority has had its trust revoked by Mozilla after it was found to issue weak and potentially compromisable certificates.
Adobe has perhaps bowed to the inevitable and, in a notice to developers, advised them that it is ceasing development of the Adobe Flash environment for smartphones and tablets, although critical security and bug fixes will be available.
Reports are coming in that officials in Estonia – arguably one of the most internet-savvy governments in the world – have taken down a massive DNS-changing cybercrime operation involving a click-fraud program that infected more than four million comput…
When is a flaw not a flaw? When it’s a feature of the operating system, it seems, as serial Apple Mac cracker Charlie Miller has tapped a feature of Apple’s portable operating system and created an iPhone/iPad app that allows almost complete remote acc…
Kaspersky Lab has made the interesting discovery that there is a massive DNS poisoning attack under way in Brazil, with several ISPs in the country falling victim to the attacks.
The Defense Advanced Research Projects Agency (DARPA) plans to increase investment in cybersecurity research by 50% over the next five years and focus more on offensive cyberwar capabilities, according to the head of the agency.
Infosecurity has reported on the value of stolen credit and debit card credentials several times this year, but now a security researcher has analyzed the value of individual credentials such as your birthday or mother’s maiden name – that’s right, the…
Information security professionals collaborating to outsmart hackers was cited as the most effective way to preempt hacker attacks, according to a survey of Wisegate members.