A vulnerability that could affect 99 percent of the world’s Android-powered phones and tablets has been unearthed within the Google-owned platform.
Browsing: Malware and Vulnerabilities
Opera, situated in Norway, and creator of a Web-browser that’s extremely popular worldwide, recently declared one network intrusion of a rather frightening type that cyber-criminals attempted on it. Nakedsecurity.sophos.com published this dated June 27, 2013.
America’s largest commercial ports have failed to shore up defenses against potential cyber attacks, a new study contends, raising concerns about the vulnerability of computer networks that help move energy, foodstuff and other goods to market.
A threat advisory paper by information security firm Command Five has made the claim that Atlassian may be including a backdoor in its Crowd software.
Major vulnerabilities in a protocol for remotely monitoring and managing servers would allow attackers to hijack the computers to gain control of them, access or erase data, or lock others out.
HTML Injection is a vulnerability which occurs in web applications that allows users to insert html code via a specific parameter for example or an entry point.
The third annual Web Application Vulnerability Report from Context Information Security shows that despite increased awareness and understanding of web application security, the level of vulnerabilities in web apps remains largely unchanged.
We are always spoilt in April with not only Infosec, but 44Cafe and BSides London too – and this year was another corker.
In the wake of the recent NSA / Prism debacle, there has been a large push for secure, encrypted communications for the average user.
In the realm of IT security, when organisations have their very business on the line, the instinct for most companies is to simply throw money and technology at the problem, upgrading technical systems at every opportunity to keep pace with emerging threats.