Home security
 

Keywords :   


Tag: security

Cisco releases security patches for Unified Communications Manager

2013-07-18 18:03:21| InfoWorld: Top News

Cisco Systems released a security patch for its Unified Communications Manager (Unified CM) enterprise telephony product in order to mitigate an attack that could allow hackers to take full control of the systems. The company also patched denial-of-service vulnerabilities in its Intrusion Prevention System software. The Cisco Unified CM is a call-processing component that extends enterprise telephony features and functions to IP phones, media-processing devices, VoIP gateways, and multimedia applications, according to Cisco.

Tags: security manager communications releases

 

Java Dregs Create Unappetizing Enterprise Security Problem

2013-07-18 16:46:00| TechWeb

Why is Java still such a security weakspot? Java updates don't nuke all older versions, leaving plenty of well-known vulnerabilities for attackers to exploit.

Tags: problem create security java

 
 

Apple to bulk up on security with help from fingerprint patent

2013-07-18 14:38:37| CNET News.com

The company's patent application, which was published on Thursday, shows how the iPhone's display can be used as a fingerprint sensor for additional security. [Read more]    

Tags: with security apple patent

 

UK to probe Huawei security staff

2013-07-18 14:38:36| BBC News | Business | UK Edition

The UK orders an inquiry into Chinese firm Huawei after being warned a conflict of interest involving the firm could pose a security threat.

Tags: security staff probe huawei

 

5 security best practices for your business

2013-07-18 12:00:00| InfoWorld: Top News

If your small-to-midsized business is like most, you're playing a game of chicken with cyber-criminals. You probably know that your defenses probably arent able to repel today's sophisticated, persistent attacks, yet you hope that you'll be overlooked. IT security is complex, and security professionals are mired in a nonstop arms race against cyber-criminals. It's easy to read headlines and think, "If the DoD can be penetrated, how am I going to ward off would be attackers?"

Tags: your business security practices

 

Sites : [698] [699] [700] [701] [702] [703] [704] [705] [706] [707] [708] [709] [710] [711] [712] [713] [714] [715] [716] [717] next »