General

Last Updated on 13 Nov. 2014, Total: 153 Blog Posts

  1. Understanding the Bitcoin concept

    Top Bitcoin exchange explains virtual currency in simple web tutorial... Read More

  2. iCloud security and privacy overview

    Apple’s iCloud is built with industry-standard security practices and employs strict policies to protect users’ data... Read More

  3. Is IE11 paving the way towards a more secure web browsing?

    IE11 makes 39% of Web sites more secure by discouraging the use of vulnerable RC4 based cipher suites and increases security on 16% of Web sites by negotiating TLS 1.2, the most secure version of TLS... Read More

  4. Cisco TelePresence VX Clinical Assistant Administrative Password Reset Vulnerability

    Cisco has released free software updates that address this vulnerability... Read More

  5. Handling Destructive Malware

    The US Computer Emergency Readiness Team (US-CERT) has published a security tip on how to handle destructive malware... Read More

  6. Vulnerability in Microsoft graphics component could allow remote code execution

    Microsoft is aware of a vulnerability in previous versions of Office that is actively exploited in targeted attacks using crafted Word documents sent by email. The vulnerability will not affect Office 2013 but will affect older versions such as Office 2003 and 2007... Read More

  7. Resolving Your PST Nightmares Once and for All!

    Join Microsoft MVP, J. Peter Bruzzese, and Sherpa Solutions Architect, Rick Wilson, on Thursday, November 14th, at1pm EST to explore the regulatory and operational challenges associated with managing PST files and gain insights into getting control of your organization's data once and for all... Read More

  8. Cisco IOS XR Software Route Processor Denial of Service Vulnerability

    Customers that are running version 4.2.1 or later of Cisco IOS XR Software, or that have previously installed the Software Maintenance Upgrades (SMU) for Cisco bug ID CSCtz62593 are not affected by this vulnerability... Read More

  9. PayPal Persistent Mail Encoding Vulnerability

    The Vulnerability Laboratory Research Team discovered an input validation mail encoding vulnerability in the official PayPal Inc (Ebay) MainStreet finance service company website... Read More

  10. Windows 7 and Windows 8 Security Guidelines

    The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert... Read More

Featured Links