The Blackhat 2008 security conference was held recently in Las Vegas. Along with the RSA Security conference held in San Francisco at the beginning of each year, Blackhat is one... Read More
The Microsoft Dynamics GP is vulnerable to four heap and stack-based buffer overflows. A remote attacker could overflow the buffer and execute arbitrary code or gain control of the affected system by sending malicious queries to the Distributed Process Server or Distributed Process Manager. Read More
Back in April I wrote a blog post where I stated that in my opinion nothing in the world of digital data is unbreakable or impenetrable and that LifeLock, an... Read More
It is one thing when TJ Maxx or The Gap are careless with employee or customer data. Everyone entrusted with sensitive information such as addresses, birthdates, credit card information, bank... Read More
You have probably noticed that most retail establishments now have you swipe your own credit card. That is based, at least in part, on a goal to never have your... Read More
Google is jumping into the browser war. Chrome, the new web browser from Google, is set to take on Microsoft Internet Explorer, Mozilla Firefox and others. The current release is... Read More
Read More
There are a variety of threats attempting to compromise your computer and it takes a variety of tools to protect against them. Many vendors sell security suites, but many people... Read More
Read More
Do you have a MySpace or Facebook site? Do you access it from your computer at work? Social networking sites like these are one of the next challenges facing information... Read More
Jesper Johansson, co-author of Windows Vista Security: Securing Vista Against Malicious Attacks, recently wrote an article in The Register which dissects a new type of threat. Anyone with a blog... Read More
Wednesday, September 10, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment