Смотрите также связанные темы 21.06.2018 Protecting Against Application-Specific Attacks We’ve seen an evolution from mass-mailing viruses to more targeted attacks and threats targeting OS vulnerabilities moving to attacks against applications. We’ve seen growth in attacks targeting systems that contain valuable data, including mission-critical enterprise applications sitting in virtual environments, SAP solution-based environments and storage systems. Companies must take these threats seriously and look for [...]
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
18.10.2018 CVE-2015-5444 Multiple cross-site scripting (XSS) vulnerabilities in HP Smart Profile Server Data Analytics Layer (SPS DAL) 2.3 before 2.3.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
16.11.2018 The Threat Within: 3 Out Of 4 Companies Affected By Internal Information Security Incidents According to a joint study conducted by Kaspersky Lab and B2B International, 73% of companies have been affected by internal information security incidents, and the largest single cause of confidential data losses are employees (42%)
21.04.2018 Young adults most likely to lose a phone, making them top targets for mobile hackers In the past year, over one-in-four young Internet users have lost their devices (17%) or had their devices stolen (13%), with a third losing access to their online accounts, or suffering from a loss of data privacy as a result
13.06.2018 Nearly a Quarter of Wi-Fi Networks Around Olympic Venues in Rio are Unsecure In the lead-up to the Olympic Games in Rio de Janeiro, Kaspersky Lab analysts and researchers mapped and assessed the security of the Wi-Fi networks visitors will encounter. More than 4,500 single unique access points were discovered in areas near Olympic Games venues. 18% of Wi-Fi networks tested were open - which means that the data sent and received through them is not encryption protected and can therefore be compromised.
11.07.2018 Corporate News: Kaspersky Lab Reports Large Proportion Of Wireless Internet Access In Uk Homes Is Not Safe From Attack While more than half of respondents have wireless Internet access in the home, over two thirds of these have not taken steps to ensure adequate protection to prevent data theft and ID fraud, or are unsure of the required precautions to take
27.08.2018 CVE-2008-3851 Multiple directory traversal vulnerabilities in Pluck CMS 4.5.2 on Windows allow remote attackers to include and execute arbitrary local files via a .. (dot dot backslash) in the (1) blogpost, (2) cat, and (3) file parameters to data/inc/themes/predefined_variables.php, as reachable through index.html; and the (4) blogpost and (5) cat parameters to data/inc/blog_include_react.php, as reachable through index.html. NOTE: the issue involving vectors 1 through 3 reportedly exists because of an incomplete fix for CVE-2008-3194.
28.08.2018 CVE-2008-3858 The Downlevel DB2RA Support component in IBM DB2 9.1 before Fixpak 4a allows remote attackers to cause a denial of service (instance crash) via a crafted CONNECT data stream that simulates a V7 client connect request.
17.01.2018 CVE-2015-4958 IBM InfoSphere Master Data Management - Collaborative Edition 9.1, 10.1, 11.0 before 11.0.0.0 IF11, 11.3 before 11.3.0.0 IF7, and 11.4 before 11.4.0.4 IF1 does not properly restrict browser caching, which allows local users to obtain sensitive information by reading cache files.
|