Brian Prince

Adobe Working on Patches for Newly Discovered Zero-Day Code Flaws

Adobe Systems has confirmed it is working on a patch for critical zero-day vulnerabilities that are under attack in the wild. Researchers at security firm FireEye first warned on Feb. 12 about a new exploit that can be used to compromise Adobe Reader. According to FireEye, if the vulnerability is successfully exploited, it will deploy […]

Microsoft Patch Tuesday Addresses 57 Security Vulnerabilities

Microsoft released fixes for a whopping 57 security vulnerabilities as part of this month’s Patch Tuesday. The patches are tucked inside 12 different security bulletins, five of which have Microsoft’s highest security rating of “critical.” The issues solved by the update span a number of products, including Microsoft Windows, Office, Internet Explorer (IE), Microsoft Exchange […]

Secret Service Investigating Email Hack, Theft of Bush Family Files

A criminal investigation has reportedly been launched into the hacking of email accounts belonging to former presidents George H.W. Bush and George W. Bush and members of their family. According to the Los Angeles Times, Jim McGrath, a spokesman for George H.W. Bush, said that the situation is being investigated by authorities. “There’s a criminal […]

Adobe Issues Emergency Flash Player Patches to Block Cyber-Attacks

Adobe Systems patched critical code flaws today to thwart ongoing attacks against Adobe Flash Player. According to Adobe, attackers are targeting two Flash Player vulnerabilities in the wild. The first, CVE-2013-0633, is being exploited in attacks designed to fool the user into opening a Microsoft Word document contained in an email that has malicious Flash […]

Half of Ex-Employees Walk Off with Corporate Data: Symantec Survey Findings

Co-workers who left their jobs for one reason or another may have walked out with a lot more than their last paychecks or the clothes on their backs. According to a new report by Symantec, half of the employees who left or lost their jobs in the last 12 months kept confidential corporate data, and […]

RedSeal Targets Network ‘Dark Space’ With Big Data Analytics

Security risk management vendor RedSeal Networks wants to shine a light on blind spots in IT networks using big data analytics. In the latest release of the RedSeal Platform, version 6.5, the vendor addresses “dark space” – a term meant to describe the parts of the network infrastructure that is unmanaged, unmonitored and unseen by […]

Twitter Resets 250,000 User Passwords After Cyber-Attack

Twitter was forced to reset the passwords of 250,000 of its users after it discovered that hackers breached the social network’s security. Twitter disclosed on Feb. 1 that it had detected unusual access patterns that ultimately led to the identification of unauthorized attempts to access user data. This led to the discovery of a live […]

Cisco: E-Commerce Sites More Likely to Deliver Malware Than Malicious Ones

The most effective traps being set for Internet users are not on malicious sites, but the sites users would least expect—and the ones they trust the most. In Cisco Systems’ 2013 annual security report, researchers found that online shopping sites are 21 times as likely—and search engines 27 times as likely—to deliver malicious content as […]

Twitter Info Requests From Governments Jumped in 2012 Second Half

Twitter fielded nearly 20 percent more requests for information from governments around the world in the second half of 2012 than it did during the first. According to its latest transparency report, the number of information requests jumped 19 percent to 1,009 between July and December from 849 during the previous six months. Some 815 […]

Latest Java Flaw Bypasses Security Control, Security Researchers Say

Security researchers have uncovered yet another ding in the battered armor of Java security. This time there is a vulnerability in the latest version of Java that allows attackers to execute unsigned Java code on a targeted Windows system regardless of the Java security control settings, according to findings from Security Explorations. “Our Proof of […]