Corporate Anti-Spam Made Simple with Vircom modusGate™ 5.20 for Microsoft...
Vircom, an award-winning e-mail messaging security software company, has released modusGate™ 5.20, an email security and anti-spam filter software for Microsoft Exchange™ servers. The updated software...
View ArticleEscalating Cyber Threats Propel Asia-Pacific Enterprises to Adopt Web...
Sophistication of attacks and growing number of web applications fuel demandSINGAPORE, Jan. 22, 2013 /PRNewswire/ -- The proliferation of mobile devices has facilitated the migration of business...
View ArticleEVault’s Annual Cloud-Connected Backup and Recovery Survey Discovers IT...
Survey Findings Also Show IT Starting to Take Action on Pressing BYOD IssuesSAN FRANCISCO--(BUSINESS WIRE)--In its second-annual survey released today, EVault, Inc., a Seagate Company revealed that...
View ArticleXirrus Takes the Complexity out of High-Performance Wi-Fi With a New Class of...
New Zero Touch XR-520 AP With Application Control Ensures That Applications Always WorkTHOUSAND OAKS, CA--(Marketwire - Jan 22, 2013) - Xirrus®, the leader in high-performance wireless networks, today...
View ArticleHeap Sprays to Sandbox Escapes: A Brief History of Browser Exploitation
This article looks at the evolution of various exploitation techniques used for widely exploitingclient applications along with exploit prevention technologies available in the industryBrowser...
View ArticlePwn2Own Hacking Bounties To Exceed $500,000
Hewlett-Packard’s TippingPoint announced the prize fund for Pwn2Own 2013 back on the 17th of January. And this time around the amount on offer exceeds half a million US dollars based on the following...
View ArticleWordpress Developer Formatter CSRF Vulnerability
====================================================================================================================# Exploit Title: Wordpress Developer Formatter CSRF Vulnerability# Google Dork:...
View ArticleRadware Releases Global Security Report - Reveals New Cyber Attack Methods...
Server-based botnets and HTTPS layer attacks among the tactics leveraged by hackers in some of 2012's most notorious attacksMAHWAH, New Jersey, January 22, 2013 /PRNewswire/ --In the face of an...
View ArticleAdult Webmaster Script Password Disclosure Vulnerability
# Exploit Title: Yagina.com Adult Webmaster Script Admin Password Disclosure# Category:webapps# Description software : software website for webmasters promoting adult companies through referrals#...
View ArticleAspect Security Launches Free Tool to Measure Gaps in Developers' Application...
New Online Analytics Tool Makes It Easy to Determine Strengths and Weaknesses in the Secure Coding Skill-Set of Development TeamCOLUMBIA, MD--(Marketwire - Jan 22, 2013) - Aspect Security, a pioneer in...
View ArticleCloudPassage Webinar: Operating PCI Compliant Servers on Amazon EC2
Attendees will learn strategies for achieving compliance leveraging cloud server deployment best practicesCloudPassageAchieving regulatory compliance in the cloud is often misunderstood. This webinar...
View ArticlePanetta is critical on the security level for NATO networks
oday on Atlantic Council web site it has been published an excerpts from remarks by Secretary of Defense Leon Panetta at King’s College in London that remarks the inadequacy of NATO networks to reject...
View ArticleUsing Timestomp To Change The MACE Values Of A File
Often in post exploitation activities penetration testers are trying to access files in order to read their contents.However this means that immediately the MACE (Modified-Accessed-Created-Entry)...
View ArticleSSL / TLS Renegotiation DoS
SSl / TLS Renegotiation DOSSynopsisThe remote service allows repeated renegotiation of TLS / SSL connections.DescriptionThe remote service encrypts traffic using TLS / SSL and permits clients to...
View ArticleFuture Malware to Be Injected into Systems via Electromagnetic Interference
Modern malware can infect computers in quite a number of ways, but future infections will be able to take over networks not even connected to the Internet. The infiltration mechanism under research at...
View ArticleFirst Google wants to know all about you, now it wants a RING on your finger...
Top Google bods are mulling over using cryptographic finger-ring gadgets and other ways for users to securely log into websites and other services.The ad giant's security veep Eric Grosse and engineer...
View ArticleDell Unveils Global BYOD Survey Results: Embrace BYOD or Be Left Behind
Singapore leads the list in putting users first, followed by U.K., Australia, France and Italy; United States ranks lowest in the management of users as more important than devices.Nearly...
View ArticlemoTwin Survey Reveals Enterprise Applications Are Not Moving to Mobile Fast...
Cost, Time and Resources are Deterrents Despite Strong Desire to Deploy Mobile Apps; Most Planning to Move to Mobile In Next Two YearsPALO ALTO, CALIFORNIA--(Marketwire - Jan. 22, 2013) - moTwin, a...
View ArticleSolutionary Research Reveals That 58 Percent of Vulnerabilities Targeted by...
Solutionary Security Engineering Research Team (SERT) Q4 Threat Report Shows DDoS Attacks Decreased, Web Authentication Security and Malware Attacks IncreasedOMAHA, NE--(Marketwire - Jan 22, 2013) -...
View ArticleSurvey Shows People Need More Help Controlling Personal Info Online
New videos and tips from Microsoft help consumers better manage privacyREDMOND, Wash., Jan. 23, 2013 /PRNewswire/ -- To mark Data Privacy Day 2013, Microsoft Corp. released new data reflecting...
View Article