pGet in touch with us:  +44 (0) 1252 757181
Wednesday, February 04, 2015
Steve Atkinson
Numerous versions of Linux are at risk from a "GHOST" vulnerability that an attacker could exploit - remotely or locally - to bypass credential checks and seize control of a system, warn researchers at cloud security and vulnerability scanning vendor Qualys. The flaw exists in the GNU C Library, a.k.a. "glibc." ..
Friday, December 12, 2014
Steve Atkinson
Last year Hackers broke into Target's POS system after they stole network credentials from a third party vendor that serves the retailer. ..
1 2 3