Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

AIG Survey Finds More Insurance Decision Makers Concerned about Cyber Threat...

Develops First-Ever Cyber Risk Management Mobile App, Launches Other Tools to Complement CyberEdge Insurance Solution, Meet Demand for Cyber Threat InformationNEW YORK--(BUSINESS WIRE)--A survey of...

View Article


new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus...

This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== OpenVAS plugins (11) ==r15392 803300...

View Article


Microsoft Security Bulletin Advance Notification for February 2013-...

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256********************************************************************Title: Microsoft Security Advisory NotificationIssued: February 7,...

View Article

[RHSA-2013:0241-01] Moderate: xen security update

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1=====================================================================                   Red Hat Security AdvisorySynopsis:          Moderate: xen security...

View Article

PCI SECURITY STANDARDS COUNCIL RELEASES PCI DSS CLOUD COMPUTING GUIDELINES

— PCI Special Interest Group offers guidance for securing payment card data in cloudenvironments —WAKEFIELD, Mass., February 07, 2013 — Today the PCI Security Standards Council (PCISSC), an open,...

View Article


Mobile spammers release DIY phone number harvesting tool

Need a good reason not to connect to the public Web with your phone? Wonder where all that SMS spam is coming from? Keep reading.Mobile phone spammers have recently released a new version of a well...

View Article

Infonetics: Employee-Owned “Rogue” Devices a Top Reason Enterprises Invest in...

CAMPBELL, Calif.--(BUSINESS WIRE)--Market research firm Infonetics Research released excerpts from its 2013 Mobile Security Strategies and Vendor Leadership: North American Enterprise Survey, which...

View Article

Imperva Announces Fourth Quarter and Full Year 2012 Financial Results

Total revenue of $31.8 million during the fourth quarter, up 36% year-over-yearFourth quarter services revenue growth of 53% was driven by the 205% increase in subscription revenueGAAP operating loss...

View Article


Guidance Software Reports 2012 Fourth Quarter and Full Year Financial Results

Q4 2012: Record non-GAAP revenue of $36.7 million, up $6.8 million, or 23% year-over-year, and non-GAAP EPS of $0.17 per shareFull year 2012: Record non-GAAP revenue of $130.9 million and non-GAAP EPS...

View Article


The RSA Conference 2013 at Your Fingertips: Mobile App sponsored by Prolexic...

HOLLYWOOD, Fla., Feb. 7, 2013 /PRNewswire-iReach/ -- The RSA Conference 2013 at Your Fingertips: Mobile App sponsored by Prolexic is now available on iTunes and Google Play(Photo:...

View Article

Arxan Technologies Presents Next Generation Mobile App Attacks at Apps World...

Protecting the App Economy Requires a Rigorous Understanding of Key App Integrity Risks and Threats, Says CTOSAN FRANCISCO, CA--(Marketwire - Feb 7, 2013) - Arxan Technologies, the industry-leading...

View Article

Image may be NSFW.
Clik here to view.

[SECURITY] [DSA 2618-1] ircd-hybrid security update

-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1- -------------------------------------------------------------------------Debian Security Advisory DSA-2618-1...

View Article

Wordpress plugin CKEditor 4.0 Arbitrary File Upload Exploit

# Exploit-Title: Wordpress plugin CKEditor 4.0 Arbitrary File Upload Exploit# Date: 2013-02-07# Author: sk0d# Software-Link: http://downloads.wordpress.org/plugin/ckeditor-for-wordpress.4.0.zip#...

View Article


webAssist Sqli Vulnerability

[+] webAssist Sql Injection Vulnerability[-] Found by Angel Injection[-] Version: N/A[-] Security -::RISK: middel[-] platforms: php[-] Dork: intext:"Powered By webAssist" inurl:index.php?pid=[-] Link:...

View Article

Bohemian Arbitary File Upload vulnerability

####################################################################################################################### Exploit Title: "Bohemian Arbitary File Upload### Author: NEt_Bomber### Contact:...

View Article


cURL Buffer Overflow

cURL buffer overflowWed 06 February 2013Volema found remotely exploitable buffer overflow vulnerability in libcurl POP3, SMTP protocol handlers which lead to code execution (RCE). When negotiating SASL...

View Article

MS13-005 Proof Of Concept Exploit

/*    ms13-005-funz-poc.cpp - Drive a Medium IL cmd.exe via a Low IL process and message broadcasted    Copyright (C) 2012 Axel "0vercl0k" Souchet - http://www.twitter.com/0vercl0k    This program is...

View Article


Air Disk Wireless 1.9 LFI / Command Injection

Title:======Air Disk Wireless 1.9 iPad iPhone - Multiple VulnerabilitiesDate:=====2013-02-08References:===========http://www.vulnerability-lab.com/get_content.php?id=850VL-ID:=====850Common...

View Article

LADYBOYLE COMES TO TOWN WITH A NEW EXPLOIT

By now you have probably heard of the new zero-day exploit in Adobe flash that was patched today. FireEye Labs identified the exploit in the wild on 02/05/2013, which based on the compile time and...

View Article

[RHSA-2013:0245-01] Critical: java-1.6.0-openjdk security update

----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1=====================================================================                   Red Hat Security AdvisorySynopsis:          Critical:...

View Article
Browsing all 8064 articles
Browse latest View live