Microsoft patches 25 vulnerabilities |
- Microsoft patches 25 vulnerabilities
- 15 vulnerabilities patched in Adobe Reader and Acrobat
- The lazy programmer's guide to secure computing
- Apache.org hit by XSS, bruteforce attack
- Google's priorities: Security and mobility
- 10 online safety tips
- Medical records secured by code-changing algorithm
- New Data Loss Prevention solution from CheckPoint
- Future air travel security risks, privacy and social implications
- iPhone unlocking tricks get PCs into trouble
- Event: BSidesBoston 2010
Microsoft patches 25 vulnerabilities Posted: 13 Apr 2010 11:40 AM PDT In today's Patch Tuesday, Microsoft delivers 11 security bulletins to address 25 vulnerabilities affecting Windows, Office and Exchange. Five bulletins are rated Critical, five rated Important and one... |
15 vulnerabilities patched in Adobe Reader and Acrobat Posted: 13 Apr 2010 11:25 AM PDT Critical vulnerabilities have been identified in Adobe Reader 9.3.1 (and earlier versions) for Windows, Macintosh, and UNIX, Adobe Acrobat 9.3.1 (and earlier versions) for Windows and Macintosh, and A... |
The lazy programmer's guide to secure computing Posted: 13 Apr 2010 11:10 AM PDT This presentation starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. We then define the Principle of Least Authority (PO... |
Apache.org hit by XSS, bruteforce attack Posted: 13 Apr 2010 08:53 AM PDT The Apache Software Foundation is the latest victim of a targeted attack aimed at its infrastructure - more specifically, at the SliceHost server (brutus.apache.org) hosting their issue-tracking softw... |
Google's priorities: Security and mobility Posted: 13 Apr 2010 07:44 AM PDT The future of computing is mobile. This statement has been repeated time and again by many people in the computer industry, and yesterday was Eric Schmidt's turn to say it. The Google CEO par... |
Posted: 13 Apr 2010 06:52 AM PDT Parents and teachers should avoid overlooking the dangers associated with the Web and the risks they pose to children. Kids today are fascinated by the Internet and extremely skilled when it comes to ... |
Medical records secured by code-changing algorithm Posted: 13 Apr 2010 05:57 AM PDT Medical records databases are a treasure trove for researchers - mapping trends in diseases and studying them to discover better treatment methods has never been easier. Information that was previ... |
New Data Loss Prevention solution from CheckPoint Posted: 13 Apr 2010 05:00 AM PDT Check Point announced its new network-based Data Loss Prevention (DLP) solution that helps businesses move data loss from detection to prevention by pre-emptively protecting sensitive informationregu... |
Future air travel security risks, privacy and social implications Posted: 13 Apr 2010 03:03 AM PDT The European Network and Information Security Agency (ENISA) has analyzed the risks associated with a future air travel scenario, enabled with "Internet of things", IoT / RFID technology. The report i... |
iPhone unlocking tricks get PCs into trouble Posted: 13 Apr 2010 01:33 AM PDT A malware-spreading mechanism targeting the "iPhone unlocking" fans goes to prove that cybercrime is never short of imagination. This is how the story goes: you receive an e-mail in which you find out... |
Posted: 13 Apr 2010 01:23 AM PDT BSides Boston will have three tracks (with "availability" for additional, ad-hoc talks that come up during the event). Two tracks will feature traditional-style presentations; the third track (and ad... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment