Zero-day attack exploits latest version of Adobe Reader
A previously undocumented flaw in the latest version of Adobe Systems’ ubiquitous Reader application is being exploited in online hacks […]
A previously undocumented flaw in the latest version of Adobe Systems’ ubiquitous Reader application is being exploited in online hacks […]
Companies have to manage security across a wide range of issues and threats. Operating systems and applications have to be
Microsoft’s upcoming Surface Pro tablet, running on Windows 8 Pro, has now been reviewed a few days before its launch
One of the biggest ongoing challenges for Linux advocates has always been that there is such a paucity of data
Enlarge Net Marketshare In the first month of 2013, Internet Explorer’s desktop market share is continuing to slowly climb upwards,
Following disclosures by security researchers of vulnerabilities in the last update of Java released in January, Oracle has rushed out
Hackers behind a recently detected email attack campaign are exploiting a vulnerability in a Yahoo website to hijack the email
Decoding Microsoft Office: Which Office version does what? Once upon a time, bright boxes of the latest Microsoft Office pleaded
A report by The Register reveals that Microsoft blames OEMs for its relatively lackluster Windows 8 sales. Purportedly, Microsoft believes