The Latest in IT Security

1

Concerns about Huawei’s 5G rollout topped the agenda of a third US-France cybersecurity meeting, Washington’s top cyber diplomat Robert Strayer told reporters in Paris. The United States did not ask France for a Huawei ban, he said, but for strong protections against potential “malicious intrusions” from software and firmware updates of any systems provided by […]

Read more ...

1

Microsoft informed customers last Friday that Internet Explorer is affected by a zero-day vulnerability. The flaw has been described as a memory corruption issue that can be exploited for remote code execution by getting the targeted user to visit a specially crafted website with an affected version of the browser. The flaw affects the scripting […]

Read more ...

1

Tracked as CVE-2019-19781 and featuring a CVSS score of 9.8, the vulnerability has existed since 2014. Exploitation could result in attackers gaining unauthorized access to internal network resources and executing arbitrary code. “All supported versions of the product, and all supported platforms” are impacted by the security flaw, Positive Technologies, the company that discovered the […]

Read more ...


Categories

SATURDAY, JANUARY 25, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments