Смотрите также связанные темы 01.07.2018 Разработка эксплоитов для Linux. Часть III - переполнение буфера с помощью ret2libc В данном руководстве будет продемонстрирована эксплуатация переполнения буфера с помощью ret2libc.
04.04.2018 Переполнение буфера: анатомия эксплоита Взгляд на то, как эксплуатируются уязвимости систем и почему существуют эксплоиты.
21.06.2018 Protecting Against Application-Specific Attacks We’ve seen an evolution from mass-mailing viruses to more targeted attacks and threats targeting OS vulnerabilities moving to attacks against applications. We’ve seen growth in attacks targeting systems that contain valuable data, including mission-critical enterprise applications sitting in virtual environments, SAP solution-based environments and storage systems. Companies must take these threats seriously and look for [...]
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
18.10.2018 CVE-2015-5444 Multiple cross-site scripting (XSS) vulnerabilities in HP Smart Profile Server Data Analytics Layer (SPS DAL) 2.3 before 2.3.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
16.11.2018 The Threat Within: 3 Out Of 4 Companies Affected By Internal Information Security Incidents According to a joint study conducted by Kaspersky Lab and B2B International, 73% of companies have been affected by internal information security incidents, and the largest single cause of confidential data losses are employees (42%)
21.04.2018 Young adults most likely to lose a phone, making them top targets for mobile hackers In the past year, over one-in-four young Internet users have lost their devices (17%) or had their devices stolen (13%), with a third losing access to their online accounts, or suffering from a loss of data privacy as a result
13.06.2018 Nearly a Quarter of Wi-Fi Networks Around Olympic Venues in Rio are Unsecure In the lead-up to the Olympic Games in Rio de Janeiro, Kaspersky Lab analysts and researchers mapped and assessed the security of the Wi-Fi networks visitors will encounter. More than 4,500 single unique access points were discovered in areas near Olympic Games venues. 18% of Wi-Fi networks tested were open - which means that the data sent and received through them is not encryption protected and can therefore be compromised.
11.07.2018 Corporate News: Kaspersky Lab Reports Large Proportion Of Wireless Internet Access In Uk Homes Is Not Safe From Attack While more than half of respondents have wireless Internet access in the home, over two thirds of these have not taken steps to ensure adequate protection to prevent data theft and ID fraud, or are unsure of the required precautions to take
18.08.2018 CVE-2008-3704 Stack-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0 allows remote attackers to execute arbitrary code via a long Mask parameter, as exploited in the wild in August 2008. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|