Смотрите также связанные темы 29.02.2018 Множественные уязвимости в Symantec Encryption Manager Удаленный пользователь может повысить привилегии, раскрыть важные данные, выполнить произвольные команды и вызвать отказ в обслуживании.
13.06.2018 Nearly a Quarter of Wi-Fi Networks Around Olympic Venues in Rio are Unsecure In the lead-up to the Olympic Games in Rio de Janeiro, Kaspersky Lab analysts and researchers mapped and assessed the security of the Wi-Fi networks visitors will encounter. More than 4,500 single unique access points were discovered in areas near Olympic Games venues. 18% of Wi-Fi networks tested were open - which means that the data sent and received through them is not encryption protected and can therefore be compromised.
19.08.2018 SQL Server 2005 Best Practices Analyzer (August 2008) На сайте Майкрософт появился августовский выпуск популярной утилиты анализа соответствия рекомендациям сервера баз данных: SQL Server 2005 Best Practices Analyzer (BPA). Информация о программе: Страница загрузки: SQL Server 2005 Best Practices Analyzer (August 2008) Файл для загрузки: SQLBPASetup.msi Версия: 9.00.1009.00 Язык: Английский Дата публикации: 13 августа 2008г. Размер файла загрузки: 2Мб Полезные ресурсы: SQL Server Manageability Team Blog
22.08.2018 CVE-2008-3775 Folder Lock 5.9.5 and earlier uses weak encryption (ROT-25) for the password, which allows local administrators to obtain sensitive information by reading and decrypting the QualityControl_pack registry value.
09.10.2018 About Bitmap Discovery Exploits It was announced this week that Bernd Roellgen of PMC Ciphers has “discovered” a possible exploit which can be used to reveal details of the encryption key used to protect hard disk image backups. PMC used this information to promote the release of a new version of their software which is immune.
Some customers have asked [...]
16.01.2018 CVE-2009-0056 Cross-site request forgery (CSRF) vulnerability in the administration interface in Cisco IronPort Encryption Appliance 6.2.4 before 6.2.4.1.1, 6.2.5, 6.2.6, 6.2.7 before 6.2.7.7, 6.3 before 6.3.0.4, and 6.5 before 6.5.0.2; and Cisco IronPort PostX 6.2.1 before 6.2.1.1 and 6.2.2 before 6.2.2.3; allows remote attackers to execute commands and modify appliance preferences as arbitrary users via a logout action.
31.01.2018 There is no “trying” in data protection There is no trying when it comes to protecting your customer’s data: Heartland tries to rally industry in wake of data breach (Network World)
The CEO of Heartland Payment Systems (Robert Carr) is calling for the card payment industry to share security information and consider end-to-end encryption.
Mr. Carr is a strong advocate of “end-to-end encryption — which [...]
10.03.2018 Hard disk encryption still needs management This week CNET News contributor Jon Oltsik blogged about how he believes that now there’s a unified standard for hardware disk encryption, governments should lead the transition to self-encrypting hard disks. Jon makes the point that hardware encryption is simple, fast, and generally more secure than software encryption.
While it would be admirable to see any [...]
19.03.2018 CVE-2009-0971 Cross-site scripting (XSS) vulnerability in futomi's CGI Cafe Access Analyzer CGI Standard Version 3.8.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
03.05.2018 Хакер Analyzer будет экстрадирован в США 29-летний Тененбаум (Analyzer) и три его сообщника-канадца были арестованы в сентябре 2008 года в Канаде по обвинению в мошенничестве с использованием компьютерного взлома.
|