'Highly critical' flaw found -- and fixed -- in Apple's media player software.
RealNetworks confirms that users are at risk of code execution attacks.
Unknown attacker sends spam messages with a malicious file masquerading as a Red Hat security update.
Users of 'the other' browsers are at risk of spoofing attacks.
Collaboration will push for interoperability between competing platforms for network security compliance.
October's batch of patches includes a monster fix for the Internet Explorer browser and critical updates for SMTP, NNTP, Excel and Windows Shell.
The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems.
The computer maker issues patch for its media player and tends to other flaws in OS X.
The first signs of a large-scale virus attack are spotted on newsgroups regarding a Windows flaw in the way JPEG images are processed.
The giants file a joint federal suit against an alleged Canadian spamming operation.
Microsoft's detection tool can be used to identify vulnerable versions of the GDI libraries that handle JPEG processing.
Security experts predict a large-scale worm attack is inevitable.
The merger creates a managed security services firm called CyberTrust and new competition for Symantec, Verisign and McAfee.
Apple issues security update to fix a flaw in its instant messaging client.
The open-source project plugs vulnerabilities in its Web browser and e-mail client.
Microsoft's note to premium customers gives advance notice of two security advisories coming next Tuesday, internetnews.com has learned.
The cross-platform IM client contains a boundary error vulnerability.
The complete delivery due by April 2005 to give businesses time to prepare.
The company patched more than a dozen flaws in the Jaguar and Panther versions of the Mac operating system.
IBM releases 'FixPaks' for vulnerabilities found in its DB2 Universal Database product.
Security holes in the network authentication protocol could lead to code execution and DoS attacks.
Security patches released for multiple 'high risk' flaws in Oracle's enterprise-focused products.
The new WinAmp 5.05 modifies the way the skin installer mechanism works.
The FTC releases a helpful guide to avoid the lure of phishers.
Zero-day exploit targets Nullsoft's WinAmp media player via the popular skinning feature.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?