The Latest in IT Security

Posts Tagged ‘vulnerabilities’

The flaws, related to how the kernel handles TCP Selective Acknowledgement (SACK) packets with a low minimum segment size (MSS), could impact many devices, including servers, Android smartphones and embedded devices. Exploitation involves sending specially crafted packets to the targeted device and some believe the flaws could have significant and widespread impact. A total of […]

Read more ...

Available as version 60.7.1, the latest Thunderbird iteration addresses only four vulnerabilities. Of these, three were rated High severity and one Low risk. An attacker capable of exploiting the most severe of these vulnerabilities could execute arbitrary code on the vulnerable machine, the Multi-State Information Sharing and Analysis Center (MS-ISAC), a division of the Center […]

Read more ...

With businesses continuing their digital migrations to cloud services and applications, IT is finding itself wrestling with how to keep companies’ data safe. The challenge? The cloud has created a next-generation, virtual perimeter. Businesses are using infrastructure-as-a-service (IaaS), cloud storage, software-as-a-service (SaaS) applications housed by third parties, and are connecting to these resources using mobile […]

Read more ...

Categories

THURSDAY, JULY 18, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks