Provisional decision reached to focus on software developers Read More
Read More
Three out of 46 government data transfers remain unencrypted Read More
Telco plans to charge $1.50 to those who prefer paper Read More
Read More
Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache. Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008. At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More
Wednesday, September 10, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment