The Latest in IT Security

minus
plus

Categories

THURSDAY, MAY 23, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks

1

  The security hole, tracked as CVE-2019-0604, got its first patch in February and another one in March after the first fix turned out to be incomplete. Microsoft described the issue as a remote code execution vulnerability caused by the software’s failure to check the source markup of an application package. It can be exploited […]

Read more ...

1

Roughly one year ago, Gjoko Krstic, a researcher at industrial cybersecurity firm Applied Risk, started analyzing building management (BMS), building automation (BAS) and access control products from Nortek, Prima Systems, Optergy, and Computrols. The products include Computrols CBAS-Web, Optergy Proton/Enterprise, Prima FlexAir, and two Nortek Linear eMerge products. Krstic has identified a total of over […]

Read more ...