Wednesday, September 10, 2008

Consulting with a difference to take on North Island

Clarus has a list of around 100 contractors, who have all been invited to become members Read More

Deployment time was cut through a platform approach Read More

German authorities cautions consumers to stay clear from Google's latest browser Read More

Patch fixes buffer overflow bug Read More

Finalists announced Read More

Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache.  Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008.  At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More

Humiliating breakdown on what looked set to be one of the busiest trading days of the year Read More

Phitek makes further aviation inroads Read More

Three out of 46 government data transfers remain unencrypted Read More

Silverlight becoming more of an open runtime environment, says product manager Read More

No comments: