Exploits / vulnerabilities - News, Features, and Slideshows
BitTorrent applications used by hundreds of millions of users around the world could be tricked into participating in distributed denial-of-service (DDoS) attacks, amplifying the malicious traffic generated by attackers by up to 50 times.
By Lucian Constantin | 18 August, 2015 00:35
An Italian teenager has found two zero-day vulnerabilities in Apple's OS X operating system that could be used to gain remote access to a computer.
By Jeremy Kirk | 17 August, 2015 13:51
An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
By Lucian Constantin | 15 August, 2015 03:17
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
By Jeremy Kirk | 14 August, 2015 11:11
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
By Katherine Noyes | 13 August, 2015 08:37
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- CCIBM ESB Developer (Junior to mid level role)NSW
- CCIT Solution Designer (SOA / Web-services)NSW
- CCMid-level DevOps EngineerNSW
- CCSolution Architect - .NET TechnologiesNSW
- CCAngularJS DeveloperNSW
- CCService EngineerVIC
- FTMobile Designer / Developer - IOSNSW
- CCIT Performance Test AnalystACT
- CCMicrosoft Dynamics CRM DeveloperSA
- CCHigh Level Network Engineer (Communications)WA
- CCMultiple Middleware DevelopersACT
- CCFront End DeveloperVIC
- CCHybris Developer - Global ConsultancyNSW
- CCContract Analyst Programmer (SQL/Oracle/.Net) 160129/AP/vhs-bAsia
- CCSSIS/ SSRS ExpertVIC
- CCSolution Architect - .NET environmentACT
- FTFront End Developer Required Working World Leading Digital TeamNSW
- CCContract Analyst Programmer 160120/AP/vvtAsia
- CCJava Development Contract - MelbourneVIC
- FTSenior Oracle DBANSW
- CCAutomation QAVIC
- CCHelpdesk SupportNSW
- FT.NET DeveloperVIC
- FTIT Support AnalystNSW
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- SD-WAN: What it is and why you’ll use it one day
- Android root malware widespread in third-party app stores
- UCLA just open-sourced a powerful new image-detection algorithm
- SCO vs. IBM legal battle over Linux may – finally – be finished
- Microsoft adds conservative release 'ring' to Windows 10 beta program
- 6 things you should know about Twitter's timeline change
- Microsoft lets cautious users try more of Windows 10’s leading edge
- Bill filed in Congress would ban encryption backdoors
- Networking company name change madness is upon us
- Browser maker Opera's board urges sale to Chinese collective for $1.2B
- A new IoT gateway design could be Bluetooth's ticket to the cloud
- LG's G5 smartphone to have 'always on' ability
- Data science achieves the ultimate ROI: A craft beer
- SAP slaps patch on leaky factory software
- Paul McCartney gives Skype some silly love songs