Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

WhatsApp's violation of privacy law partly resolved after investigation by...

OTTAWA and THE HAGUE, Netherlands, Jan. 28, 2013 -- Canadian and Dutch data privacy guardians release findings from investigation of popular mobile appOTTAWA and THE HAGUE, Netherlands, Jan. 28, 2013...

View Article


Report: Lost Documents, Portable Memory Devices to Blame for Majority of...

Nearly two-thirds surveyed suffered data breaches according to HCCA, SCCE surveyMINNEAPOLIS, Jan. 28, 2013 /PRNewswire-USNewswire/ -- Lost paper files and portable memory devices account for 65 percent...

View Article


Joomla com_alfurqan Blind SQLi Exploit

#Exploit Title: Joomla Component com_alfurqan Blind SQL Injection#Google Dork: inurl:"com_alfurqan"#Date: 28/01/2013#Exploit Author: D35m0nd142#Vendor Homepage:...

View Article

Find out which mobile apps are stealing your identity

Takeaway: Mobile device malware is approaching exponential growth. Mobile apps are the vehicle of choice to deliver malware. Michael P. Kassner looks at our options.Mobile-security pundits preach...

View Article

Find out which mobile apps are stealing your identity

Takeaway: Mobile device malware is approaching exponential growth. Mobile apps are the vehicle of choice to deliver malware. Michael P. Kassner looks at our options.Mobile-security pundits preach...

View Article


Find out which mobile apps are stealing your identity

Takeaway: Mobile device malware is approaching exponential growth. Mobile apps are the vehicle of choice to deliver malware. Michael P. Kassner looks at our options.Mobile-security pundits preach...

View Article

NSIS Systems Launches Recovery-as-a-Service (RaaS) Based on VirtualSharp...

New Service for SMBs Assures Recovery to the CloudMCLEAN, VA--(Marketwire - Jan 28, 2013) - VirtualSharp Software, the leading provider of next generation automated Disaster Recovery solutions for...

View Article

The Virtualization Practice Releases 'Secure Hybrid Cloud Reference...

AUSTIN, TX--(Marketwire - Jan 28, 2013) - The Virtualization Practice, an industry analyst firm that provides unique analysis, commentary and resources on Virtualization and Cloud Computing, has...

View Article


Hardware.com Offers Tips for Data Privacy Day

Five practical steps companies can take to minimize internal and external threats to data privacyMINNEAPOLIS--(BUSINESS WIRE)--According to Google Inc., the corporation comes across 9,500 new malicious...

View Article


Vormetric Vault Prevents Downtime and Revenue Loss Associated with Expired...

All-in-One Solution Automates Management of Certificates, Keys and Security ObjectsSAN JOSE, Calif.--(BUSINESS WIRE)--Vormetric, Inc., the leader in enterprise data security, today announced Vormetric...

View Article

Threat Outbreak Alert: Malicious Files Distributed Via E-mail Messages

DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain information about phishing websites for the recipient.The text...

View Article

Threat Outbreak Alert: Fake Unspecified E-mail Messages

DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain an unspecified message for the recipient. The e-mail message...

View Article

Threat Outbreak Alert: Fake Product Purchase Order Request E-mail Messages

DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain sample order details for the recipient. The text in the e-mail...

View Article


[ MDVSA-2013:005 ] perl

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:005http://www.mandriva.com/security/...

View Article

Twitter Provides Government Requests For Account Information, Removal...

Twitter says it believes the open exchange of information can have a positive global impact. Therefore for those unaware they provide users with statistics on "Government Requests For Account...

View Article


new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus

This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== Nmap Scripting Engine scripts (1) ==r30564 ike-version...

View Article

AirWatch Expands Mobile Email Management Suite with Android Email Container...

Solution Combines Additional Security with Consistent Experience across Android DevicesMobile World Congress 2013ATLANTA--(BUSINESS WIRE)--AirWatch®, the global leader and innovator in mobile security...

View Article


[RHSA-2013:0199-01] Important: libvirt security update

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1=====================================================================                   Red Hat Security AdvisorySynopsis:          Important: libvirt...

View Article

Apple updates iOS fixing 27 vulnerabilities and TURKTRUST revocation

Apple has released version 6.1 of its iOS operating system that is the brains of millions of iPhones, iPads and iPod Touch devices.I would consider this to be a critical update, as many of the fixes...

View Article

More Than A Dozen Brands Of Security Camera Systems Vulnerable To Hacker...

Digital video recorders have revolutionized home and business security, making it possible to easily store and play back hundreds of hours of surveillance camera footage. But a few design flaws in...

View Article
Browsing all 8064 articles
Browse latest View live