The Latest in IT Security

Posts Tagged ‘ip’

Universities can make juicy targets for attackers of all stripes: state-tied advanced persistent threat (APT) groups that want intellectual property (IP), criminals that want money, even the students themselves who might be looking to cause trouble. They all pose a potential threat. Last year 76 universities located across the world were attacked by hackers reportedly […]

Read more ...

Joomla 3.8 brings more than 300 improvements to the popular content management system (CMS) and patches two vulnerabilities, including one that can be exploited to obtain administrator credentials. Researchers at RIPS Technologies discovered that Joomla versions between 1.5 and 3.7.5 are affected by a potentially serious vulnerability when using Lightweight Directory Access Protocol (LDAP) authentication. […]

Read more ...

Now hackers have come up with virtual ways to be transparent – at least to the law: cyber cloaks. Cyber cloaks are most powerful for those engaged in criminal cyber activity, as it offers the freedom from consequence of persecution. In general, the cloak consists of one or more of five core ingredients, and there […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments