Adobe’s browser plug-in is automatically updated in Google Chrome, Internet Explorer 10 and 11 From a total of six vulnerabilities, three of them
Read MoreHere is the published exploit for the Elegance theme in WordPress. This Local File Disclosure proof of concept will read the passwd file of a Lin
Read MoreTo the untrained eye, the email in question will probably sound legitimate. Highlighted by the fine gents at Symantec, the spam campaign contains
Read MoreThe security flaw, which was first reported by HP’s Zero Day Initiative a few days ago, would allow an attacker who successfully exploits it to r
Read MorePidgin is considered to be a fairly safe application and it’s not really open to vulnerabilities, but it seems that is not above reproach. Accord
Read MoreThe vulnerabilities are considered critical and they’ve been assigned a priority rating of 1, which means that they’re either being targeted, or
Read MoreAccording to Trend Micro, the Word vulnerability has been leveraged in targeted attacks against government agencies and an educational institutio
Read MoreSometime last month,Kurtz reportedly noticed that emailattachments within Mail were not protected by Apple’s, despite the company claiming to use
Read MoreAccording to chr13 Facebook Notes allows users to include <img> tags. Whenever a <img> tag is used, Facebook crawls the image from th
Read MoreA 19-year-old computer science student has been arrested by the Royal Canadian Mounted Police (RCMP) and accused of stealing personal data by exp
Read MoreLondon: British parenting website Mumsnet is the latest organisation to have been hacked due to the “Heartbleed” bug, founder Justine Roberts re
Read MoreRussia and Brazil are hacking Facebook, and the social network is paying them to do it. Facebook paid out US$1.5 million to security researchers
Read MoreSecurity researchers released technical details and proof-of-concept code for 30 security issues affecting Oracle’s Java Cloud Service, some of w
Read More