-
Microsoft releases critical Internet Explorer patch
The update fixes a JavaScript-related vulnerability which is being actively exploited through hacked Web sites
-
-
Researchers inadvertently release IE7 attack code
Chinese researchers fail to note that the last security patch released by Microsoft did not take care of a problem they had earlier identified; thinking the problem has been fixed, the researchers release code that might be misused to exploit an unpatched IE 7 vulnerability
-
-
Hackers target rich content files
New security report says that PDF and Flash files will be used by cybercriminals much more in 2009
-
-
No end in sight for Moore's Law
Moore’s Law lives! Worries that reduction in transistor size to below ~20 nm would create heating and quantum effects so severe that such transistors will not be of practical use (read: an end to Moore’s Law) are misplaced; researchers show the Moore’s Law will obtain for a while yet
-
-
DSL routers vulnerable to malware attacks
New reports says DSL modems are susceptible to attacks more typically associated with Web sites: Hackers can insert malware onto the victim’s computer or recruit the computer as a bot for a botnet
-
-
EU considers allowing police to place Trojans on suspects' computers
Remote searches of suspects’ computers could become a mainstay of cybercrime investigations under a new EU strategy announced last week
-
-
Scholarships, guaranteed jobs for cyber security students
State University of New York at Buffalo uses $868,000 Federal CyberService Award from the National Science Foundation (NSF) to award undergraduate, graduate scholarships
-
-
"Digital DNA" to fight cyber crime
Scottish researchers develop what they call “digital DNA”: It is based on analyzing the way in which users access data on their computers and then creating a digital fingerprint that is unique to each user
-
-
New bridge-inspection software contributes to bridge security
Inspecting a bridge for hairline cracks, flaking concrete, and rust has been a manual process — inspectors have always examined bridges for visible damage directly on site; German researchers develop software which allows digital inspection of bridges and other structures
-
-
Good code, bad computations: A computer security vulnerability
Beware of return-oriented programming — that is, if you want to make sure your computer or server is not tricked into undertaking malicious or undesirable behavior
-