Exploits / vulnerabilities - News, Features, and Slideshows
- The 'grinch' isn't a Linux vulnerability, Red Hat says
- This Linux grinch could put a hole in your security stocking
- Vulnerability in embedded Web server exposes millions of routers to hacking
A critical vulnerability in client software used to interact with Git, a distributed revision control system for managing source code repositories, allows attackers to execute rogue commands on computers used by developers.
By Lucian Constantin | 19 December, 2014 21:40
The "grinch" Linux vulnerability that Alert Logic raised alarms about Tuesday is not a vulnerability at all, according to Red Hat.
By Joab Jackson | 19 December, 2014 08:27
A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet.
By Lucian Constantin | 19 December, 2014 06:16
A grinch may be snatching away some year-end holiday time, forcing Linux system administrators to fill a gaping security hole in their systems.
By Joab Jackson | 17 December, 2014 01:05
An Israeli security firm has found a security flaw in Alibaba Group's international marketplace that could have wreaked havoc for the scores of merchants on the site.
By Michael Kan | 10 December, 2014 21:08
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
Of those organizations that are able to detect attacks, more than 23% experienced 2 to 5 breaches or significant attacks in the past two years. Visibility holds the key to improved detection and response capabilities. Organizations need to understand their environment and what constitutes normal and abnormal behavior, train staff on how to use analytic tools and define the data they need to collect.
- US rejects North Korea offer to investigate Sony hack, reaches out to China
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright