Cisco fixes broken RV320/RV325 router patches as more exploits emerge
Admins managing Cisco's RV320 and RV325 routers should definitely install new firmware available today.
Admins managing Cisco's RV320 and RV325 routers should definitely install new firmware available today.
Adobe will release fixes for two more critical Flash Player bugs from Italian firm Hacking Team this week, but security researchers say to disable the software until it's delivered.
Operations Shady RAT, Operation Aurora, Operation Night Dragon sounds like names out of a WikiLeaks memo or even more a Hollywood action blockbuster. Sadly not, these are the three names that have done the rounds in the last 2 – 3 years where information security defenses of organizations were not only breached but data assets were stolen for sure.
Puneet Kukreja | 31 Aug | Read more
The developers of the uTorrent file-sharing application have released an updated version that fixes a problem that could allow an attacker to load malicious code onto a user's computer.
Jeremy Kirk | 30 Aug | Read more
Adobe Systems patched 20 security vulnerabilities in its Shockwave Player on Tuesday. Most of the flaws could allow an attacker to run their own code on an affected computer.
Jeremy Kirk | 26 Aug | Read more
This is a real issue, and not just one for the well publicised attacks on major corporations such as Sony, Lockheed, Google, and Citi. It affects every business and organisation, large and small. More worrying still, it is now widely suggested that hackers and espionage organisations are moving away from directly attacking their target company, choosing instead to route their attack through suppliers to their target. Thus, even small and seemingly innocuous “third party” businesses who would not consider themselves as potential targets are now on the front line of this cyber war.
Malcolm Higgins | 13 Jul | Read more
Many organizations are embracing SOA as a way to increase application flexibility, make integration more manageable, lower development costs, and better align technology systems to business processes. The appeal of SOA is that it divides an organization's IT infrastructure into services, each of which implements a business process consumable by users and services.
Chris Clark | 19 Jan | Read more
Authentication is the most visible security control for applications used by enterprises and their customers. Individuals who would like more details regarding strong authentication methods available today to secure access to corporate networks and enterprise or customer applications. Learn how your environment will dictate which method is right for you.