Home vulnerability
 

Keywords :   


Tag: vulnerability

Xen Project discloses serious vulnerability that impacts virtualized servers

2014-10-02 02:06:25| Telecom - Topix.net

The Xen Project has revealed the details of a serious vulnerability in the Xen hypervisor that could put the security of many virtualized servers at risk. Xen is a free, open-source hypervisor used to create and run virtual machines.

Tags: project servers impacts vulnerability

 

Shellshock: A deadly new vulnerability that could lay waste to the internet

2014-09-26 12:42:15| Extremetech

There's a new internet-crippling zero-vulnerability in town called Shellshock. It potentially affects around half of all websites on the internet (around 500 million), and millions or billions more internet-connected devices such as routers, smartphones. In simple terms, this means that it's now relatively simple for anyone to gain unauthorized access to a large portion of the world's computers.

Tags: to the internet waste

 
 

Hackers exploit critical vulnerability in popular WordPress theme component

2014-09-04 21:15:46| InfoWorld: Top News

Attackers are actively exploiting a critical vulnerability in a WordPress plug-in that's used by a large number of themes, researchers from two security companies warned Wednesday. The vulnerability affects versions 4.1.4 and older of Slider Revolution, a commercial WordPress plug-in for creating mobile-friendly content display sliders. The flaw was fixed in Slider Revolution 4.2 released in February, but some themes -- collections of files or templates that determine the overall look of a site -- still bundle insecure versions of the plug-in.

Tags: popular theme critical component

 

Celeb hacking scandal shows digital vulnerability

2014-09-03 09:05:55| Wireless - Topix.net

That's the advice experts offer after hackers broke into female celebrities' personal accounts, stole nude photos and posted them on the web.

Tags: digital shows scandal hacking

 

Android vulnerability still a threat to many devices nearly two years later

2014-08-02 02:22:26| Wireless - Topix.net

Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.

Tags: two years later devices

 

Sites : [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] next »