Generative Data Intelligence

Tag: vulnerability

Zero Day Vulnerability in Adobe Flash Player Threatens Web Users

Reading Time: 2 minutesCriminals are using a new zero day vulnerability in the Adobe Flash Player to conduct drive-by-downloads, infecting unsuspecting web site...

FireFox 35 Fixes Critical Security Flaws , Adds Chat Feature

Reading Time: 2 minutesThis week Mozilla addressed 3 critical security vulnerabilities in the release of Firefox 35 this week. Firefox 35 also includes...

OpenSSL Security Update Patches Denial of Service Vulnerability

Reading Time: 1 minuteOpenSSL has released updates patching eight vulnerabilities, one of which may allow an attacker to cause a Denial of Service...

Adobe Fixes Critical Security Flaw in Flash Player

Reading Time: 1 minuteAdobe has released security updates to address a vulnerability in Flash Player which could potentially allow a remote attacker to...

Docker Requires Critical Security Updates

Reading Time: 1 minuteDocker has released a critical security updates to address security flaws in Docker versions prior to version 1.3.2. These include...

Webcam Vulnerability: Who is Watching Whom?

Reading Time: 2 minutesThe first video phone was a sensation at the 1939 World’s Fair, and again a quarter century later at the...

Microsoft Patches 19 Year Old Bug

Reading Time: 2 minutesAmong its monthly bulletins announced this week, Microsoft announced a fix for vulnerability so old that if it was a...

Do You Need PCI Vulnerability Scanning?

Reading Time: 2 minutesWeb sites have never been more under attack by hackers and E-commerce sites are a prime target.  Right now,  do...

Trust Seals: E-Commerce Runs on Trust

Reading Time: 2 minutesMany e-Commerce sites display “Trust Seals”, aka Trust Mark Logos, provided by third parties who have conducted an independent audit...

POS Under Attack: The Why, How & What to Do

Reading Time: 4 minutesOver the past year, there have been an alarming number of high profile data breaches of customer cardholder and personal...

TLS vs SSL: The Difference May Surprise You!

Reading Time: 3 minutesWhen you work with SSL (Secured Sockets Layer) to secure your web site or other types of communication, you may...

Microsoft Plagued By Zero Day Vulnerabilities

Reading Time: 2 minutesThe opportunities for hackers and cybercriminals never seems to end. Microsoft issued a warning this week on an unpatched zero day...

Latest Intelligence

spot_img
spot_img
spot_img