Cloud Computing Services in Russia Offer Huge Growth Potential, Finds Frost &...
The continuing adoption of cloud services will have a significant impact on both the public and private sectorsLONDON, Jan. 14, 2013 /PRNewswire/ --Cloud computing has the potential to improve many...
View ArticleWordpress wp-codebox Plugin Full Path Disclosure Vulnerability
#------------------------------------------------------------------------------------------------------------------# Exploit Title: Wordpress wp-codebox plugin Full Path Disclosure vulnerability# Date:...
View ArticleThermo Fisher Scientific Introduces Intuitive Database Software for Lab Samples
Thermo Scientific VisionTracker delivers efficient, secure sample organization and trackingORLANDO, Fla.--(BUSINESS WIRE)--Thermo Fisher Scientific Inc., the world leader in serving science, today...
View ArticleMotorola Solutions to Bring Windows Embedded 8 Handheld-based Devices to...
evices combine proven security and manageability customers rely on from Microsoft with the enterprise mobile computing expertise of Motorola SolutionsNRF 102nd Annual Convention & EXPONEW...
View ArticleCVE-2012-5650 Apache CouchDB DOM based Cross-Site Scripting via Futon UI
CVE-2012-5650DOM based Cross-Site Scripting via Futon UIAffected Versions:Apache CouchDB releases up to and including 1.0.3, 1.1.1, and 1.2.0are vulnerable.Description:Query parameters passed into the...
View ArticleCVE-2012-5649 Apache CouchDB JSONP arbitrary code execution with Adobe Flash
CVE-2012-5649JSONP arbitrary code execution with Adobe FlashSeverity: ModerateVendor: The Apache Software FoundationAffected Versions:JSONP is supported but disabled by default in all currently...
View ArticleCVE-2012-5641 Apache CouchDB Information disclosure via unescaped backslashes...
CVE-2012-5641Information disclosure via unescaped backslashes in URLs on WindowsAffected Versions:All Windows-based releases of Apache CouchDB, up to and including1.0.3, 1.1.1, and 1.2.0 are...
View ArticleFastest Wi-Fi ever is almost ready for real-world use
WiGig routers, docking stations, laptop, and tablet shown at CESIn a quiet suite removed from the insanity of the Consumer Electronics Show expo floor, a company aiming to build the fastest Wi-Fi chips...
View ArticleThe "Red October" Campaign - An Advanced Cyber Espionage Network Targeting...
Here's a link to the full paper (part 1) about our Red October research. During the next days, we'll be publishing Part 2, which contains a detailed technical analysis of all the known modules. Please...
View ArticleDigest::SHA double free when using load subroutine
The following was fixed in Digest-SHA Perl module in Version 5.81:5.81 Mon Jan 14 05:17:08 MST 2013 - corrected load subroutine (SHA.pm) to prevent double-free -- Bug #82655:...
View Article3 DoS conditions in Rake
Three issues were noted in recent release of upstream Rake. All are DoSissues.From https://bugzilla.redhat.com/show_bug.cgi?id=895277 (2 issues):Upstream released [1] Rack 1.4.2, 1.3.7, 1.2.6, and...
View ArticleSality rootkit analysis
Sality is a well known family of file-infectors (or PE-infectors or just a viruses). And as malware it has a very long story of evolution since 2003. Latest it versions contain rootkit on board to...
View ArticleWebalo Survey Confirms “Mobile Revolution” as Companies Struggle with...
98% of Respondents Say Mobile Enterprise Access Will Improve Productivity; 59% Prefer Smartphones Over TabletsLOS ANGELES--(BUSINESS WIRE)--Webalo, Inc., today announced survey results confirming that...
View ArticleNew Dimensional Research Report Depicts 2013 as the Year of VDI in the...
More than 80% of companies surveyed considering VDI as part of IT strategy; reduced costs and faster deployments as key adoption points for VDIAUSTIN, Texas--(BUSINESS WIRE)--Pivot3, a leading provider...
View ArticleSecurity Leaders Urge Organizations to Prepare for Big Data Revolution in...
New RSA® Security Brief Outlines How Big Data will Transform Security Approaches and Technologies by 2015BEDFORD, Mass., Jan. 15, 2013 /PRNewswire/ --News Summary:Security experts from Booz Allen...
View ArticleAnti-Phishing Expert, Wombat Security Technologies, Unveils Social...
Wombat's New Security Awareness Training Software Module Strengthens Employee Response to Increasingly Sophisticated Social Engineering AttacksPITTSBURGH, PA--(Marketwire - January 15, 2013) - Wombat...
View ArticlePromisec Unveils Major Upgrades in Promisec Endpoint Manager 4.8
Endpoint Intelligence Solution Offers Increased Detection, UNIX/Linux Support, BYOD Management and MoreNEEDHAM, MA--(Marketwire - Jan 15, 2013) - Promisec, a leading provider of actionable endpoint...
View ArticlephpLiteAdmin v1.8.x->1.9.x (SQLi/FD)
#### Title : phpLiteAdmin v1.8.x->1.9.x (SQLi/FD) <= Multiple Vulnerabilities# Author : KedAns-Dz# E-mail : ked-h (@hotmail.com# Home : Hassi.Messaoud (30500) - Algeria -(00213555248701)# Web...
View ArticleFedora 18 Features Updated User Interfaces and Desktop Environments
ommunity Collaboration Advances Free and Open Source Distribution with New Fedora ReleaseRALEIGH, N.C.--(BUSINESS WIRE)--The Fedora Project, a Red Hat, Inc. sponsored and community-supported open...
View ArticleEmbedded SIMs NOT the End for MNOs Competing Against Apple and Google for...
LONDON--(BUSINESS WIRE)--Whilst only 7 million embedded SIMs shipped in 2012 the advent of standards and subscription management are expected to result in 195 million devices including the technology...
View Article