The Latest in IT Security

Posts Tagged ‘Exploit’

Content Management systems (CMS) have become an attractive target for #hackers who aim to #exploit #vulnerabilities in the popular blogging platform #wordpress. Globally, more than 20 percent of WordPress based-websites are running older core versions. #outdated WordPress plugins are also at high #risk. All WordPress sites that are running core version 4.2.3 or below are […]

Read more ...

Recently, an international hacking ring was discovered to have stolen more than $100 million. The sophisticated plan demonstrated ingenuity on the part of the attackers. They exploited a core vulnerability of the financial system in one of the digital age’s insider trading schemes, according to one news report. This is the first U.S. prosecuted criminal […]

Read more ...

Hackers have been taking advantage of a serious zero-day vulnerability in the latest version of Apple’s OS X (Yosemite), allowing them to install malware and adware on Macs without the need of a password or administrative privileges. Malwarebytes reported yesterday (Monday 3rd August) that one of its experts had found the first known exploit of […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments