Смотрите также связанные темы 06.11.2018 Checking your kids browser history This week, I would like to discuss an item that was brought up in a comment on my first blog by Parry Aftab, McAfee’s Family Internet Safety Advisor. She told a story about a cybersafety video she shot in England with a network security administrator who was also a mom. Parry asked her to do [...]
29.01.2018 A Security Vulnerability in Sun Java System Access Manager May Allow Privilege Escalation of Sub-Realm Administrators A security vulnerability in Sun Java System Access Manager may allow a sub-realm administrator to escalate their privileges and access the root realm as an administrator.
08.05.2018 Security Vulnerability with HTTP Response Splitting in Sun Java System Delegated Administrator A security vulnerability in Sun Java System Delegated Administrator may allow a remote unprivileged user to influence the data stored by an intervening proxy server in response to data transferred from the Delegated Administrator server (by means of HTTP Response Splitting), or to perform related Cross-Site Scripting activities.
21.06.2018 CVE-2011-0006 The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.
03.09.2018 Kaspersky Lab granted new patent covering remote security deployment technology for smartphones and tablets Control over mobile devices is an essential element of corporate security, and it is best implemented centrally, so there is no need to install and set up security software on each individual smartphone or tablet PC. A new technology from Kaspersky Lab makes this possible by allowing for remote installation and set-up on mobile devices. Patent number 8,250,540 covering this technology has been granted to Kaspersky Lab by the US Patent Office.Both corporate devices and employees’ personal smartphones and tablets can be used to access sensitive business data. According to a study conducted by O...
15.08.2018 Protecting Endpoints is the Key to Security Control Companies today realize that they need more than just good security controls. They must also address compliance with internal security policies and industry regulations. A combination of good security functions and compliance management improves security operations efficiency and maturity. Enterprises can simplify compliance by using a single management console to audit, verify and report on [...]
14.06.2018 Why conventional wisdom won’t keep you safe There may have been a time when the term ‘Internet Speed’ didn’t apply to security. Maybe in 1993, before Mosaic/Netscape changed the face of the Web. Threats changed, but maybe back then, the changes were slow enough that the experts could keep track of most of this stuff in their heads.
Last March, we released a [...]
02.05.2018 Interop Las Vegas: No more silos It is uncanny how many familiar faces I saw as I roamed the show floor at Interop on Wednesday.
It is my second time at this event as McAfee’s CEO. While traditionally a networking fest, Interop has morphed and now includes software, security and more, so it makes sense for McAfee to be at Interop.
True to [...]
06.08.2018 Outpost Security Suite получает награду VB100% на платформе XP, SP 3 Мы рады сообщить вам, что Outpost Security Suite Pro (вер. 6.0.2296.253.0490) успешно прошел очередное тестирование антивирусов, проведенное британским журналом Virus Bulletin. Тестирование 35 персональных антивирусов и комплексов защиты для Windows XP, Service Pack 3 проводилось в рамках всестороннего анализа средств антивирусной защиты и показало стопроцентную эффективность OSS в борьбе с «дикими» (WildList) вирусами и отсутствие [...]
29.07.2018 Новости компании Agnitum (июль 2008)
|