Latest Zero day attack Stories
On Monday, another zero-day bug was reported in Internet Explorer with a pretty shocking statistic: 4 out of every 10 Americans are in danger of having their machines remotely accessed as a result of this zero-day flaw.
The group which unleashed the Hydraq or Aurora Trojan horse against Google and 34 other companies in 2009 has also been linked to attacks that have compromised systems at defense contractors, human rights organizations, and other groups.
Earlier this week, a zero-day flaw vulnerability in Java was discovered, making both Mac and Windows machines vulnerable to drive-by attacks as they surfed the web.
A vulnerability in Java is once again being blamed for a possible exploit of Mac and Windows computers alike, causing some security experts to recommend uninstalling Java as they exclaim, "Please, for the love of your computer, disable Java on your browser."
At the 2011 CanSecWest Pwn2Own hacker contest, Google Chrome was the one browser that challengers could not break into. Fast forward to the 2012 challenge, and Chrome was the first to fall, thanks to a team of French hackers who found a previously unknown vulnerability in the software.
Microsoft released an emergency update for ASP .Net on Thursday to prevent hackers from launching a denial-of-service attack.
Webcast will discuss how IT can gain control over what types of applications Windows users install using application whitelisting Scottsdale, AZ (PRWEB) June 13, 2011 In todayâ€™s Windows environment, end-users are accustomed to having local administrator privileges, which allows them to download a variety of applications and potentially misconfigure their PCs.
Built on the Retina Scanning Engine, Retina Community Allows Enterprises and SMBs to Assess and Strengthen Security and Compliance Posture without Additional Investment Phoenix, AZ (PRWEB) April 4, 2011 eEye Digital Security, a provider of IT security and unified vulnerability management solutions, today announced the release of Retina Community, a free vulnerability scanner that identifies vulnerabilities (including zero-day), configuration issues, and missing patches across operating...
Webcast will discuss how traditional anti-virus simply cannot keep up with malware and why a layered approach that includes application whitelisting is more effective strategy. Scottsdale, AZ (Vocus/PRWEB) March 28, 2011 Today, as more than 2 million new malware signatures are identified each month and more organizations are falling prey to â€œzero-dayâ€ attacks, itâ€™s no surprise that roughly half of the organizations surveyed in a 2011 State of Endpoint Risk study by the...
- A mania for the use of printing-types; a strong propensity to write for publication.