The website of a U.S. organization specializing in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer.
Researchers reveal IE zero-days after hackers set ‘watering hole’ traps
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in domestic and international security policy.
Bugs & Fixes: A roundup of Mavericks troubleshooting tips
Apple’s latest operating system update, OS X 10.9 Mavericks, is out. If you own a Mac that supports the OS update, you should get it. Now. You certainly can’t beat the price: free!
OS X Mavericks: Different name, looks the same
It doesn’t represent the UI overhaul that iOS 7 did on the mobile side, but it continues to refine OS X, applying polish where needed.
LG’s curved G Flex phone solves a problem that nobody had
Remember where you were this day; for it will go down in history as the date when LG’s mobile devices began to slightly bend for no demonstrably necessary reason.
ATM malware may spread from Mexico to English-speaking world
A malicious software program found in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.
What every iPhoto user should know about image editing
Before I dig in, allow me to preface the following with this: I am a photo dabbler. As such, …
What Does iOS 7 Bring to the BYOD Party?
Apple doesn’t promote enterprise features in its products, instead choosing to be seen as the consumer’s champion-but this doesn’t mean it doesn’t have any.
Poison Ivy, used in RSA SecurID attack, still popular
A malicious software tool perhaps most famously used to hack RSA’s SecurID infrastructure is still being used in targeted attacks, …
YouTube gets an update on mobile, with Chromecast in mind
YouTube is adding some new video-playing functions to its mobile app on both iOS and Android devices. Some of the …
Living the X Factor – The Moto X surfaces
One of the most anticipated smartphones of the year, Motorola’s flagship Moto X, is finally here, and it’s said to be one of the most customisable phone ever built.
F5 data centre firewall aces performance test
F5 Networks says its BIG-IP 10200v with Advanced Firewall Manager (AFM) can handle traffic at 80-Gbps rates while screening and protecting tens of millions of connections, and simultaneously load-balancing server traffic.
First look: Windows Server 2012 R2 Hyper-V shines on
A number of new capabilities, plus enhancements to existing ones, promise to make Windows Server 2012 R2 an even stronger candidate for the majority of virtualisation tasks most organisations need to support.
Source code for Carberp financial malware is up for sale at a very low price, researchers say
The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price.
More malware is travelling on P2P networks these days
Hackers have found a devious new way to disseminate malware: They’re using peer-to-peer networks.
Researchers find more versions of digitally signed Mac OS X spyware
Security researchers have identified multiple samples of the recently discovered “KitM” spyware for Mac OS X, including one dating back …
Netgear to target mid-market with future SDN capability
While much of the hype for software-defined networking is focused on large-scale data centre deployments, some companies are taking a …
Review: BlackBerry Q10
According to BlackBerry representatives, 80% to 90% of BlackBerry’s 76 million subscribers are still using older BlackBerry smartphones with physical …
More malware discovered from drone cyber attacks
Researchers following a cyber espionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the …
Washington, Seoul collaborate on cyber protection
Recent massive cyber attacks that paralysed computer networks at several South Korean banks and broadcasters, strongly suspected to have been …