Смотрите также связанные темы 09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...
15.08.2018 Protecting Endpoints is the Key to Security Control Companies today realize that they need more than just good security controls. They must also address compliance with internal security policies and industry regulations. A combination of good security functions and compliance management improves security operations efficiency and maturity. Enterprises can simplify compliance by using a single management console to audit, verify and report on [...]
29.07.2018 Новости компании Agnitum (июль 2008)
09.12.2018 Kaspersky Security Bulletin 2015. Развитие угроз в 2015 году Традиционно конец года – это время для размышлений, время для переосмысления жизни и мыслей о будущем. Мы бы хотели предложить наш обычный обзор основных событий, которые формировали ландшафт информационных угроз в 2015 г.
10.09.2018 CVE-2008-3012 gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka "GDI+ EMF Memory Corrupt...
23.09.2018 McAfee to Acquire Secure Computing I am excited to announce that McAfee intends to acquire Secure Computing, a leading provider of network security to businesses of all sizes. This pending acquisition clearly reinforces McAfee’s position as the largest dedicated security company and an industry leader in security risk management, providing our customers with the most comprehensive and integrated security offerings available [...]
31.10.2018 Another Record Quarter for McAfee Yesterday we announced our financial results for Q3 08. We are pleased to report that despite the current economic environment, our customers continue to view our technology as a “must-have.” Our relentless focus on security leadership has enabled us to provide our customers with innovative technology in a growing threat environment, increased manageability and an [...]
05.11.2018 Introducing the Third Generation of NAC OK, you have spent a lot to secure your endpoints, but is your investment going to waste?
IT organizations large and small have invested heavily in endpoint security to address the rapidly evolving security challenge. AntiVirus, AntiSpam, Firewall, Host Intrusion Prevention, Compliance Auditing and more have been deployed to protect and assess endpoints. Much has [...]
18.12.2018 "Лаборатория Касперского" выпустила бету новой линейки корпоративных продуктов В линейке Kaspersky Open Space Security представлены Антивирус Касперского для Windows Workstations 8.0, Kaspersky Administration Kit 8.0, Антивирус Касперского для Windows Server 8.0 и Антивирус Касперского Second Opinion Solution 8.0. Далее
09.01.2018 Рейтинг вредоносных программ, декабрь 2008 По итогам работы Kaspersky Security Network (KSN) в декабре 2008 года были сформированы две вирусные двадцатки. Первая таблица рейтинга формируется на основе данных, собранных в ходе работы антивирусного продукта версии 2009. В этой таблице зафиксированы те вредоносные, рекламные и потенциально опасные программы, которые были детектированы на компьютерах пользователей. Вторая таблица рейтинга представляет данные о том, какими вредоносными программами чаще всего заражены обнаруженные на компьютерах пользователей инфицированные объекты. В основном сюда попадают различные вредоносные программы, с...
|