Two of the five features are particularly notable because they already exist in Microsoft's Internet Explorer 8.
Articles by Kara Reeder
The attacks seemed to mostly target Democrats.
Users were greeted with some choice words about the site's founder.
A thief managed to steal 57 BlueCross BlueShield computer hard drives from a closet at Chattanooga, Tenn. call center.
Although the attacks against Marathon Oil, ExxonMobil, and ConocoPhillips occurred in 2008, the companies didn't find out about them until sometime in 2009.
The update was issued for Windows, Mac and Linux versions of the product.
The vulnerability lies in the Windows Virtual DOS Machine (VDM) subsystem.
"123456" is one of the commonly used passwords discovered in an analysis of the RockYou attack.
Merchants will be able to encrypt cards so they will not house card numbers on their systems at all.
Websense says it has seen "limited public use" of the unpatched IE vulnerability in drive-by attacks.
Akamai reports Internet attacks jumped to 78 percent for the third quarter.
A number of companies are targets of similar attacks that seem to originate from China.
Google feels very strongly that the attack originated in China.
09Droid was responsible for "dozens of these applications."
The vulnerability has to do with a potential buffer overflow error in the use of the "strtod" function.
Vulnerabilities could be used to execute arbitrary code on Windows or Mac OS X systems or to cause a crash.
Exercise will begin Feb. 9 and last three days with different attack scenario each day.
So far, there is no evidence the information has been misused.
South Africa risks creating a "perfect storm" for cyber criminals.
Once the Waledac Trojan is installed, attackers get full access to a user's machine.