Wednesday, September 10, 2008

Commercial ICT group one step closer to formation

Provisional decision reached to focus on software developers Read More

Read More

Three out of 46 government data transfers remain unencrypted Read More

Telco plans to charge $1.50 to those who prefer paper Read More

Read More

Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache.  Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008.  At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More

No comments: