Смотрите также связанные темы 22.08.2018 CVE-2012-4580 Cross-site scripting (XSS) vulnerability in McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, allows remote attackers to inject arbitrary web script or HTML via vectors related to the McAfee Security Appliance Management Console/Dashboard.
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
07.09.2018 Исследователь обнаружил множественные уязвимости в продуктах FireEye Специалист опубликовал PoC-код бреши, позволяющей прочитать произвольные файлы, и предложил на продажу еще три уязвимости.
15.03.2018 Браузер IE взломали с помощью McAfee Сотрудник антивирусной компании McAfee, рассказывая в блоге о новой уязвимости браузера Microsoft, раскрыл слишком много критических деталей - хакеры тут же использовали дыру. Далее
24.06.2018 Обнаружены множественные уязвимости на сайте Trend Micro Опубликована информация об очередных уязвимостях на сайте антивирусной компании.
28.04.2018 CVE-2012-2212 ** DISPUTED ** McAfee Web Gateway 7.0 allows remote attackers to bypass the access configuration for the CONNECT method by providing an arbitrary allowed hostname in the Host HTTP header. NOTE: this issue might not be reproducible, because the researcher did not provide configuration details for the vulnerable system, and the observed behavior might be consistent with a configuration that was (perhaps inadvertently) designed to allow access based on Host HTTP headers.
01.08.2018 One of the Strongest Quarters in McAfee History Today we announced our Q2 2008 financial results to Wall Street and delivered one of the strongest quarters in the company’s history. McAfee is outgrowing other players in the IT market as well as our competition and we continue to take market share. Our strategy is working— we had a great second quarter and we’re [...]
20.06.2018 Fighting Spam…while Fighting Hunger Who knew that our global fight against electronic spam also could help fight hunger?
McAfee recently was contacted by the Chicago office of RTKL Associates, a global architecture and engineering firm, with a request to join them in sponsoring their entry into Chicago’s Canstruction exhibition, a community event benefiting the Greater Chicago Food Depository.
Hosted by the [...]
14.05.2018 Delivering a safer Internet experience Is any Web site safe? That was the question posed in a recent article I read after it was reported that net criminals are now targeting major well known Web site destinations. In fact, McAfee estimates that 7.8 billion links that lead people to risky Web sites are served up by search engines each month.
It’s becoming more [...]
02.05.2018 Interop Las Vegas: No more silos It is uncanny how many familiar faces I saw as I roamed the show floor at Interop on Wednesday.
It is my second time at this event as McAfee’s CEO. While traditionally a networking fest, Interop has morphed and now includes software, security and more, so it makes sense for McAfee to be at Interop.
True to [...]
|