CAZ forms Cyber Security Committee
Concerns raised over the security of information passing through networks
Euroclear signs for BT managed security services - Finextra
SHARK TANK
Tales from the world of ICT
Xero pushes into Australia with new version
Xero to go head-to-head with MYOB
TECH SPOTLIGHT : New virus detector diagnoses, rubs out uninvited ... - Arkansas Democrat Gazette
IBM Internet Security Systems Advances Its Product Portfolio - MarketWatch
Security Software is a Necessary Nuisance, Say Consumers in a ... - MarketWatch
Microsoft Windows GDI+ Remote Code Execution
The Microsoft Windows GDI+ API (Gdiplus.dll) is vulnerable to multiple buffer overflows that could result in remote code execution.
Multiple Vendors Vulnerable to DNS Cache Poisoning
Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache. Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008. At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits.
Monday, September 29, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment