Tel: +61 2 9906 1592 | Fax: +61 2 9906 1596 | Email: email@example.com
Red Hat Enterprise Linux: Updated tomcat6 packages that fix three security issues and one bug are now available for Red Hat JBoss Web Server 2.0.1 on Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. CVE-2014-0075, CVE-2014-0096, CVE-2014-0099
Red Hat Enterprise Linux: Updated tomcat7 packages that fix three security issues are now available for Red Hat JBoss Web Server 2.0.1 on Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. CVE-2014-0075, CVE-2014-0096, CVE-2014-0099
Goldman Sachs is taking Google to court to force the cloud vendor to delete an email accidentally sent to a Gmail user. The consequences of a ruling for Goldman would be devastating.
Mocana's Atlas platform is intended to make it easier for users to access enterprise apps from their smartphones without compromising security.
Red Hat Enterprise Linux: Updated nfs-utils packages that fix one bug and add one enhancement are now available for Red Hat Enterprise Linux 6.
A sophisticated Chinese hacker group that had been stealing information from U.S. policy experts on Southeast Asia suddenly changed targets last month to focus on Iraq, security researchers said Monday.
An antispam organization is pushing for quick law enforcement action against five people it alleges took part in one of the largest cyberattacks on record that caused Internet outages throughout Europe early last year.
Metadata is in the news again with revelations that police in Australia. have been getting access to data collected from mobile base stations (cell towers).
The Social Security numbers of roughly 18,000 California physicians and health-care providers were inadvertently made public after a slip-up at health insurance provider Blue Shield of California, the organization said Monday.
The National Security Agency Monday defended its data collection practices amid revelations that almost 90% of the data it sweeps up involves ordinary Internet users not suspected of crimes.
The list of DDoS attacks in the month of June has made for grim reading. High-profile sites have been targeted by extortion demands, online games got disrupted and at least one company was put out of business as a direct result.
U.S. officials are open to a discussion with their German counterparts after an employee with Germany's intelligence agency was arrested for allegedly acting as a double agent for the U.S.
A couple of years ago companies were dismissive of BYOD, but as they've realized that the horse left the stable, they are adopting policies and next generation technologies to help manage BYOD. They also recognize that successful mobile security requires a cooperative partnership with employees, so are working with them to determine what policy works best for both parties, allowing BYOD to become part of the enterprise mobile security framework.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
According to a recent article in the Wall Street Journal, corporate boards are getting much more involved in cybersecurity. What's driving this behavior? While the Target breach probably influenced this behavior, corporate boards now realize that cybersecurity has become a pervasive risk that could have an adverse impact on all businesses.
Taking a page from NASA's rocket powered landing craft from it most recent Mars landing mission, the European Space Agency is showing off a quadcopter that the organization says can steer itself to smoothly lower a rover onto a safe patch of the rocky Martian surface.
Georgia Tech researchers are seeking the assistance of website operators to help better understand which sites are being censored and then figure out how to get around such restricted access by examining the data collected.
A Russian man suspected of hacking into point-of-sale systems at U.S. retailers has been arrested and faces charges in a U.S. court, the Department Justice said.
I'm going to take the most controversial stance I have ever taken:
Cisco has given us a big makeover for one of their premier Professional Level Certifications - the Cisco Certified Network Professional Security (CCNP Security) Certification. The 2014 updates retire some devices and technologies from coverage, and replace these with some of the latest and greatest in Cisco's security portfolio. It does seem that in the area of security, Cisco makes the most sweeping changes, retiring products with no warning. The ever-changing network security landscape certainly helps to make this a reality.