-
IBM developed a new technology to patch security holes
top security researchers at ibm have recently developed a new technique to etch almost entirely the impact of security vulnerabilities before they are actually found.
-
Find security holes on every site with Nikto
there are several tools and applications to find security vulnerabilities in web pages, but one of the simplest tools is nikto. this article will show you how to use nikto to check security holes on every site!
-
Security vulnerabilities - basic insights
software vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
-
9 misconceptions about security and how to resolve
almost every recent study of security vulnerabilities has come to the same conclusion: people are more risky factors for a business than technology gaps.
-
How to scan websites for potential security vulnerabilities with Vega on Kali Linux
resisting a hacker attack is one of the most important responsibilities a system administrator must perform. therefore, it is important for a system administrator to take proactive measures to find and fix vulnerabilities in their websites.
-
6 enterprise security holes to note
here are six
security vulnerabilities that are often expanded, even companies that are proud of their security precautions.
-
-
Many serious vulnerabilities have been discovered that allow attackers to take full control of the 4G router
in the past few months, security experts around the world have found that many vulnerabilities exist in 4g routers.
-
Immediately fix critical vulnerabilities in Windows NTLM security protocol
researchers on firewall preempt behavior have discovered two new vulnerabilities in windows ntlm security protocols. let's see what those holes are and how serious it is!
-
Foreshadow - the fifth most serious security hole in the CPU in 2018
this vulnerability could bypass intel sgx security measures. what a tiring year for microprocessors, especially intel.
-
How to fix BlueKeep security error for Windows 2003, Windows XP, Windows 7, Windows Server 2008
to fix the bluekeep security vulnerability, users need to disable rdp and block port 3389
-
Microsoft rewards $ 250,000 for any talent that discovers the new Meltdown and Specter vulnerabilities
in the effort to protect users from meltdown and specter vulnerabilities, microsoft has decided to launch a 'bounty hunt' program with extremely lucrative expenses for anyone who finds new security flaws. and reveal them to microsoft.
-
Detecting an extremely dangerous vulnerability on nearly 16,000 iOS applications
apps with high download volume and users of over 100 million people like instagram, amazon, twitter and dropbox are likely to be affected.
-
Safeguard against Shellshock security vulnerabilities
the main advice for computer users is to always check for the latest software updates as soon as possible.
-
The biggest security hole in 2018
2018 is a year of headache for global it professionals.
-
Serious security vulnerability on Intel chips
either leave the hole or install the patch to make it slower. how to choose it depends on you.
-
70% of Microsoft security vulnerabilities stem from memory errors
at the bluehat security conference in israel discussing security over the weekend, a microsoft engineer revealed that over the past 12 years the number of patches microsoft has released to fix security-related errors memory accounts for about 70%.
-
New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
an extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next
-
Microsoft introduced a tool to fix security holes in IE 9 and 10
microsoft has released an official security warning regarding zero-day vulnerabilities in ie10 last week and said ie 9 is also vulnerable.
-
Detects 'long-standing' security vulnerabilities in Microsoft Office
security firm bkav on july 22 has warned that a microsoft office vulnerability has been quietly exploited since 2009.
-
Mac computers stuck with a dangerous security vulnerability, Apple was announced in February but has not yet resolved
security researcher filippo cavallarin discovered a security vulnerability on macos and informed apple from february 22, but to the latest macos version, 10.14.5, this vulnerability has not been fixed yet.
-
If you are using Firefox, update it immediately to fix security
firefox is one of the best browsers available today, but it also has security flaws and you should update it immediately if you don't want to be attacked.
-
AMD and ARM both warned of security flaws like Intel processors
not only are intel processors affected but amd processors and arm mobile processors also have vulnerabilities that could threaten billions of devices globally.
-
Apple released a patch to fix security holes on Mac OS X
apple has just released the next update of mac os x, version 10.9.2, to address the security vulnerability it admitted a long time ago.
-
Detecting a serious security vulnerability on macOS, this 18-year-old youth refused to disclose it because Apple did not pay the bonus
linus henze, an 18-year-old german, recently claimed to have discovered a serious security flaw on macos that could expose the machine's storage passwords to malicious applications.
-
Release software to check DNS server vulnerabilities
according to bach khoa network security center (bkis), dns cache poisoning vulnerabilities are placing dns server systems in vietnam as well as worldwide.
-
The new zero-day vulnerability on Windows 10 helps hackers take control of the computer
this is a serious security vulnerability that could allow hackers to attack and gain control of computer devices.
-
5 common errors in managing security vulnerabilities
in the eyes of some people the issue of managing vulnerabilities is considered one of the intensive security management activities. there are others who think this is just a necessary process that microsoft has to make
-
Detecting vulnerabilities in BitTorrent applications allows hackers to control user computers
a serious flaw in the bittorrent application of transmission was discovered by tavis ormandy, a leading security expert at google. if successfully exploited, hackers can take full control of computers running linux or windows.
-
Detects many security vulnerabilities in Lenovo server infrastructure
there are a total of 9 different security holes found in lenovo's server infrastructure.
-
EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
while ransomware wannacry has stirred up the internet world over the past few weeks to exploit only two vulnerabilities, the new malware uses seven vulnerabilities.