The Latest in IT Security

Posts Tagged ‘Queries’

A vulnerability in a network that processes genomic data could pave the way to some global genetic databases being hacked, and open the door to some serious privacy issues. Experts claim the problem lies in The Beacon Project, a network run by a coalition, Global Alliance for Genomics and Health, that parses genetic data. When users send […]

Read more ...

I’m always on the lookout for breaking news about companies who might have had their systems hacked, so when I received the following email earlier today my interest was piqued.Its subject line was “An important notice about security”. We recently learned that the vendor we use to answer support requests and other emails (Zendesk) experienced […]

Read more ...

It seems that the attacks against Uyghur hasn’t stopped. We have recently encountered a compromised Uyghur website that renders a malicious flash exploiting the CVE-2013-0634 vulnerability.The flash file contains two DLL files each embedded with EXE binaries. One DLL is for 32-bit systems, while the other appears to be for 64-bit systems.The executable binaries are […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments