Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Arbor Networks to Present "Lessons Learned From the 'Triple Crown' Bank DDoS...

BURLINGTON, MA--(Marketwire - Jan 28, 2013) - Arbor Networks Inc., a leading provider of network security and management solutions for enterprise and service provider networks, will be presenting a...

View Article


[RHSA-2013:0202-01] Critical: rubygem-activesupport security update

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1=====================================================================                   Red Hat Security AdvisorySynopsis:          Critical:...

View Article


Threat Outbreak Alert: Fake Wire Transfer Notification E-mail Messages

DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain a wire transfer notification for the recipient. The text in the...

View Article

Threat Outbreak Alert: Fake Portuguese Language Payment Collection Notice...

DescriptionCisco Security Intelligence Operations has detected significant activity related to Portuguese-language spam e-mail messages that claim to contain a debt collection notification for the...

View Article

Whitepaper: Security Flaws in Universal Plug and Play: Unplug, Don't Play.

This whitepaper details research conducted by Rapid7, which reveals that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug and Play (UPnP)...

View Article


Unauthenticated remote access to D-Link DCS cameras

Unauthenticated remote access to D-Link DCS cameras===================================================[ADVISORY INFORMATION]Title:          Unauthenticated remote access to D-Link DCS camerasDiscovery...

View Article

ircd-hybrid: Denial of service vulnerability in...

Mr. Bob Nomnomnom from Torland reported a denial of service securityvulnerability in ircd-hybrid. Function hostmask.c:try_parse_v4_netmask() isusing strtoul to parse masks. Documentation says strtoul...

View Article

Today's NIST CVE Issuance's For Vulns In Microsoft and Apple Products

Click on the underlined CVE for additional vuln specific infoCVE-2013-1451Summary: Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values...

View Article


new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus

This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== OpenVAS plugins (1) ==r15315...

View Article


Must Know Business Logic Vulnerabilities In Banking Applications

(openPR) - Over the last few years, our On-Demand and Hybrid Penetration Testing platform has performed security testing of applications across various verticals and domains including Banking,...

View Article

Key Bank customers warned of ID thefts

TONAWANDA, N.Y. (WIVB) - Town of Tonawanda Police are warning Key Bank customers their accounts may have been compromised.Authorities say in the last two weeks, they have fielded at least 23 identity...

View Article

Hacker Intelligence Initiative, Monthly Trend Report #15

Lessons Learned From the Yahoo! HackHow SQL Injection Vulnerabilities in Third-Party Code Can Make for Security Cloudy1. Executive SummaryOn December 2012, an Egyptian hacker who calls himself...

View Article

Research and Markets: Electronic Access Control Systems Market: Global...

DUBLIN--(BUSINESS WIRE)--Research and Markets (http://www.researchandmarkets.com/research/cn8634/electronic_access) has announced the addition of the "Electronic Access Control Systems (Authentication...

View Article


Image may be NSFW.
Clik here to view.

IT Security and Data Protection Is Number One Challenge for Asset Managers...

Tracking & Preventing Software Downloads on Mobile Devices Also a Concern; BYOD Still Does Not Have Widespread AdoptionA whopping 96% think that organizations will be forced to alter the way they...

View Article

BlackBerry Is Still the Best Platform for Security-Conscious Organizations,...

Last week, SpectorSoft released a new version of SPECTOR 360, the company’s flagship activity monitoring solution, adding support for BlackBerry devices. SpectorSoft VP of Marketing, Nick Cavalancia,...

View Article


[OSSA 2013-001] Boot from volume allows access to random volumes (CVE-2013-0208)

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256OpenStack Security Advisory: 2013-001CVE: CVE-2013-0208Date: January 29, 2013Title: Boot from volume allows access to random volumesReporter: Phil Day...

View Article

Putting Users in Control of Plugins

Mozilla is changing the way Firefox loads third party plugins such as Flash, Java and Silverlight. This change will help increase Firefox performance and stability, and provide significant security...

View Article


JEB a powerful Android app decompiler designed for security professionals

Over the past 4 years, Android has become the #1 mobile operating system worldwide.Malicious applications are flourishing. As a security provider, are you properly equipped to analyze Android apps?JEB...

View Article

Wordpress plugins wp-levoslideshow Arbitrary File Upload Vulnerability

 -----------------------------------------------------------------------Wordpress plugins => wp-levoslideshow Arbitrary File Upload...

View Article

Cisco Security Advisory: Portable SDK for UPnP Devices Contains Buffer...

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256Cisco Security Advisory: Portable SDK for UPnP Devices Contains Buffer OverflowVulnerabilitiesAdvisory ID: cisco-sa-20130129-upnpRevision 1.0For Public...

View Article
Browsing all 8064 articles
Browse latest View live