The Latest in IT Security

Posts Tagged ‘attacker’

One of the flaws, tracked as CVE-2018-15453 and classified as “critical,” has been described as a memory corruption issue caused by improper input validation in emails signed with Secure/Multipurpose Internet Mail Extensions (S/MIME). An attacker can cause appliances to reload and enter a DoS condition by sending a specially crafted S/MIME email. When the software […]

Read more ...

A researcher who found a slew of vulnerabilities in a popular router said it’s so hopelessly broken that consumers who own them should throw them away. Pierre Kim said attackers could easily exploit the vulnerabilities and use the device as a spamming zombie or a man-in-the-middle tool. “I advise users to trash their routers because […]

Read more ...

A vulnerability in “libotr,” the C code implementation of the Off-the-Record (OTR) protocol that is used in many secure instant messengers such as ChatSecure, Pidgin, Adium and Kopete, could be exploited by attackers to crash an app using libotr or execute remote code on the user’s machine. “An attacker could execute his own code inside […]

Read more ...

Categories

MONDAY, FEBRUARY 18, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks