Смотрите также связанные темы 07.10.2018 Data theft for political gain? No way! Computerworld today reported that a Dell PC was stolen by some enterprising thieves from John McCain’s Missouri campaign office. While I usually steer clear from commenting on political activities, being only a legal alien and therefore not even able to vote for things I really care about (the local Fire Chief and Sherriff), let alone something [...]
07.10.2018 Data theft for political gain? No way! Computerworld today reported that a Dell PC was stolen by some enterprising thieves from John McCain’s Missouri campaign office. While I usually steer clear from commenting on political activities, being only a legal alien and therefore not even able to vote for things I really care about (the local Fire Chief and Sherriff), let alone something [...]
02.02.2018 Organizations responsible for third party security? A new Massachusetts law called 201 CMR 17.00 from the Office of Consumer Affairs and Business Regulation (OCABR) was passed in order to add additional protection requirements around personal information disclosure. This new regulation is specifically targeted to reduce the incidence of identity theft that comes from personal data maintained by businesses and organizations that do business in Massachusetts. This regulation is an extension of [...]
21.06.2018 Protecting Against Application-Specific Attacks We’ve seen an evolution from mass-mailing viruses to more targeted attacks and threats targeting OS vulnerabilities moving to attacks against applications. We’ve seen growth in attacks targeting systems that contain valuable data, including mission-critical enterprise applications sitting in virtual environments, SAP solution-based environments and storage systems. Companies must take these threats seriously and look for [...]
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
18.10.2018 CVE-2015-5444 Multiple cross-site scripting (XSS) vulnerabilities in HP Smart Profile Server Data Analytics Layer (SPS DAL) 2.3 before 2.3.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
17.01.2018 CVE-2015-4958 IBM InfoSphere Master Data Management - Collaborative Edition 9.1, 10.1, 11.0 before 11.0.0.0 IF11, 11.3 before 11.3.0.0 IF7, and 11.4 before 11.4.0.4 IF1 does not properly restrict browser caching, which allows local users to obtain sensitive information by reading cache files.
27.08.2018 CVE-2008-3851 Multiple directory traversal vulnerabilities in Pluck CMS 4.5.2 on Windows allow remote attackers to include and execute arbitrary local files via a .. (dot dot backslash) in the (1) blogpost, (2) cat, and (3) file parameters to data/inc/themes/predefined_variables.php, as reachable through index.html; and the (4) blogpost and (5) cat parameters to data/inc/blog_include_react.php, as reachable through index.html. NOTE: the issue involving vectors 1 through 3 reportedly exists because of an incomplete fix for CVE-2008-3194.
28.08.2018 CVE-2008-3858 The Downlevel DB2RA Support component in IBM DB2 9.1 before Fixpak 4a allows remote attackers to cause a denial of service (instance crash) via a crafted CONNECT data stream that simulates a V7 client connect request.
19.09.2018 A Victory in the War on Cybercrime In case you missed it, the U.S. House of Representatives just passed key provisions of the Identity Theft Enforcement and Restitution Act, following approval by the Senate in late July. This cybercrime bill will close gaps in the law that are exploited by cyber criminals, and will lead to more effective investigations and prosecutions. The [...]
|