101 Results for



Kleiner Perkins: Ellen Pao wanted $2.7 million to cover her legal fees

The venture capital firm claims in court filing opposing Pao's request to drop legal fees that she asked the firm for millions in exchange for not appealing the case.

By June 5, 2015


How to quickly share files in Windows 10

There's no more Share charm, but there is a Share button in File Explorer.

By January 27, 2015


Microsoft tells IE users how to defend against zero-day bug

In lieu of a fix, Microsoft offers workarounds to combat the bug that has left browser users open to attacks.

By April 30, 2014


Yahoo malware turned PCs into Bitcoin miners

Malicious ads served to Yahoo users were designed to transform computers into a Bitcoin mining operation, according to a security firm.

By January 9, 2014


Comfoo cyberspy campaign still active

The Trojan used in the RSA breach of 2010 continues to target corporations and governments worldwide. Over 200 variants were recently discovered by researchers.

By August 2, 2013


Researchers win $100,000 for Chrome hack that leaves Windows vulnerable

Researchers from MWR Labs find a way to exploit a Chrome vulnerability, sidestep Windows 7 safety measures, and do whatever they want on the operating system.

By March 7, 2013


More Java-based malware plagues the cross-platform runtime

New attacks exploit the Java plug-in as well as simply use Java to run locally when tricking users.

By March 1, 2013


Adobe confirms targeted attacks due to security hole in Reader

Cybercriminals have already taken advantage of the latest security hole in Adobe Reader and Acrobat.

By February 14, 2013


'Red October' malware spies on governments worldwide

It might have taken five years to discover, but a government-snooping spying campaign dubbed Red October has been exposed by Kaspersky Lab.

By January 14, 2013


Windows DLL bug hits dozens of apps

A flaw in the way Windows handles dynamic-link library and related files likely affects hundreds of applications and has already been used in malicious attacks in the wild.

By August 24, 2010