
Phishing With Linkedin’s Intro
In the everchanging landscape of social media, the latest ‘features’ can often be the newest vulnerabilities. Social engineering techniques have become very sophisticated, and can
In the everchanging landscape of social media, the latest ‘features’ can often be the newest vulnerabilities. Social engineering techniques have become very sophisticated, and can
Source: http://barracudalabs.com/2013/10/php-net-compromise/ It was announced that the PHP website was hacked and serving malware. If the attackers had access to their internal servers, can we
VERIS as described by it’s creators: “One of the most critical and persistent challenges plaguing efforts to manage information risk is a lack of data.
This summary includes 4 critical and 4 important vulnerabilities. Source: http://technet.microsoft.com/en-us/security/bulletin/ms13-oct
This bulletin listed 4 critical and 9 important vulnerabilities. Source: http://technet.microsoft.com/en-us/security/bulletin/ms13-sep
Three bulletins have a maximum severity rating of Critical while the other five have a maximum severity rating of Important.
OWASP is an organization that tracks most common web vulnerabilities and gives guidance for writing secure applications. They have released the New Top 10. Unfortunately,
For Patch Tuesday this month, we are receiving critical updates from both Microsoft and Adobe. Microsoft has five bulletins, bringing the six-month total up to
Help