Exploits / vulnerabilities - News, Features, and Slideshows
BitTorrent applications used by hundreds of millions of users around the world could be tricked into participating in distributed denial-of-service (DDoS) attacks, amplifying the malicious traffic generated by attackers by up to 50 times.
By Lucian Constantin | 18 August, 2015 00:35
An Italian teenager has found two zero-day vulnerabilities in Apple's OS X operating system that could be used to gain remote access to a computer.
By Jeremy Kirk | 17 August, 2015 13:51
An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.
By Lucian Constantin | 15 August, 2015 03:17
Google has released another patch for the Stagefright vulnerability after a security firm said the first one didn't fix it.
By Jeremy Kirk | 14 August, 2015 11:11
Three “high risk” vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported Wednesday.
By Katherine Noyes | 13 August, 2015 08:37
Research shows that 94% of CIOs believe that enterprise mobility has become an important part of their enterprise IT strategy. While there are many benefits for business, there are still risks when it comes to security. This whitepaper looks at the steps all organisations to take when it comes to supporting a mobile workforce.
- FTLevel 2 IT Support TechnicianVIC
- FTMid level IT consultant | Systems Integration & Managed ServicesNSW
- FTManual Test Engineer | Financial Institution | Web testingNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FTLinux Administrator with AWS & DevopsNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- FTField EngineerNSW
- FTAndroid DeveloperNSW
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FTSystems Administrator - Managed ServicesNSW
- CCE-Commerce - Senior Web Application DeveloperNSW
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are also four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- New California law requires warrants for access to private communications
- Many vulnerabilities in older Huawei 3G routers won't get patched
- New AWS tools give developers high-powered instances, better container support and more
- Qualcomm enters server CPU market with 24-core ARM chip
- Quick iPhone 6S case review: Ballistic Tungsten Tough
- AWS re:Invent 2015: Amazon aims to make AWS a better home for IoT devices
- Dell's next 'AFTE' software robot will offer cognitive intelligence
- Adidas to 3D print custom insoles in sneakers
- AT&T kicks off Wi-Fi calling years after T-Mobile
- AWS re:Invent 2015: AWS Mobile Hub streamlines app dev
- Microsoft's Surface Book to reignite OEM hostility
- Microsoft links Power BI to Alteryx for deeper analytics
- SHA-1 hashing algorithm could succumb to $75K attack, researchers say
- IBM chases Intel with new Power-based Linux servers sold over the Web
- How the cloud gives Major League Baseball a new world of stats