Daily computer virus and Trojan broadcast: MSN photo worm variant D (August 24)

According to rising global anti-virus monitoring network, there is a virus worth noting today, it is: "MSN photo Worm variant D (Worm. Win32.MSNPhoto. d)" virus. The virus will automatically send a compressed file named "“myphotos2007.zip" to the

Features and prevention methods of gray software in network security

With the proliferation of viruses, worms, Trojans, backdoors, and mixed threats, attacks against new vulnerabilities are generated much faster than before, while social engineering) traps have also become a major focus of new attacks. Attacks with

Online game world Trojan code theft and deception

In the online gaming world, a best piece of equipment doesn't know how much money, effort, and sleep a player has to spend. Therefore, the most worrying thing for players is that their virtual identities are fraudulent and virtual items are stolen

Google Chrome 5.0.375.127 updates fix multiple Security Vulnerabilities

Release date: 2010-08-19Updated on: 2010-08-25 Affected Systems:Google Chrome 5.0Unaffected system:Google Chrome 5.0.375.127Description:--------------------------------------------------------------------------------Bugtraq id: 42571Cve id: CVE-2010-

Adobe Acrobat thumbnail release Vulnerability

Release date:Updated on: Affected Systems:Adobe Acrobat 9.xAdobe Acrobat 8.xAdobe Reader 9.xAdobe Reader 8.xUnaffected system:Adobe Acrobat 9.4Adobe Acrobat 8.2.5Adobe Reader 9.4Adobe Reader 8.2.5Description:------------------------------------------

Open Handset Alliance Android SSL Certificate Spoofing Vulnerability

Release date:Updated on: Affected Systems:Open Handset Alliance Android 2.1Open Handset Alliance Android 2.0.1Open Handset Alliance Android 1.5Open Handset Alliance Android 1.0Unaffected system:Open Handset Alliance Android 2.2Description:-----------

Three security vulnerabilities in IBM Lotus Notes Ichitaro Speed Reader

Three security vulnerabilities in IBM Lotus Notes Ichitaro Speed Reader Release date: 2011-10-07Updated on: 2011-10-10 Affected Systems:IBM Lotus Notes

Ibm aix "TCP large send offload" Denial of Service Vulnerability

Release date:Updated on: Affected Systems:Ibm aix 7.xIbm aix 6.xIbm aix 5.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2012-0194 AIX is an open standard UNIX operating system that

Multiple security vulnerabilities in IBM WebSphere Sensor Events

Release date:Updated on: Affected Systems:IBM WebSphere Sensor Events 7.xDescription:--------------------------------------------------------------------------------IBM WebSphere Sensor Events is a middleware product platform designed and developed

Multiple security vulnerabilities in IBM Rational AppScan

Release date:Updated on: Affected Systems:IBM Rational AppScan 8.xIBM Rational AppScan 7.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544,

HP OpenView Performance Manager Remote Code Execution Vulnerability

HP OpenView Performance Manager Remote Code Execution Vulnerability Release date:Updated on: Affected Systems:HP Performance Manager 9.00Description:--------------------------------------------------------------------------------Bugtraq id: 52749CVE

Fortinet FortiOS (FortiGate) Cross-Site Scripting Vulnerability

Release date:Updated on: Affected Systems:Fortinet FortiOS 5.xFortinet FortiOS 4.xDescription:--------------------------------------------------------------------------------Fortinet FortiGate is a popular hardware firewall. Fortinet FortiOS

Lg nas user and password hash Information Leakage Vulnerability

Release date:Updated on: Affected Systems:LG NASDescription:--------------------------------------------------------------------------------Bugtraq id: 55721 Lg nas is a network storage solution. Lg nas exposes the user list and password hash.

Novell ZENworks Asset Management hard-coded credential Security Vulnerability

Release date:Updated on: Affected Systems:Novell ZENworks Asset Management 7.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2012-4933 ZENworks is a set of tools used to automate it

Drupal password policy module password hash Information Leakage Vulnerability

Release date:Updated on: Affected Systems:Drupal Password Policy 6. x-1.xDescription:--------------------------------------------------------------------------------Bugtraq id: 56350 Drupal is an open source content management platform. Drupal's

IBM WebSphere Portal WCM context processor Information Leakage Vulnerability

Release date:Updated on: Affected Systems:IBM Websphere Portal 8.0.0.xDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2013-6316 IBM WebSphere Portal is a framework that includes runtime

Linux is the only way to defend against "sound transfer malware"

Scientists have developed a new type of malware that uses sound waves for self-propagation. It seems that Linux is the only operating system capable of defending against such attacks. Scientists from Germany, Michael Hanspach and Michael Goetz,

Juniper Junos XNM command processor DoS Vulnerability

Release date:Updated on: Affected Systems:Juniper Networks JUNOS Juniper Networks JUNOS Juniper Networks JUNOS Juniper Networks JUNOS Juniper Networks JUNOS Juniper Networks JUNOS Juniper Networks JUNOS Juniper Networks JUNOS Juniper Networks JUNOS

Cisco ASR 5000 Series GPRS Support Node Security Restriction Bypass Vulnerability

Release date:Updated on: Affected Systems:Cisco ASR 5000Description:--------------------------------------------------------------------------------Bugtraq id: 65052CVE (CAN) ID: CVE-2014-0669 The Cisco ASR 5000 series is a carrier-level platform

Analysis and Prevention of HTTP and FTP TCP-FLOOD CC attack in CentOS 6.5

We often encounter some problems, such as http cc attacks and FTP TCP-FLOOD attacks, as shown in, we can see the continuous anonymous speculative attacks of illegal users. at this time, we have a variety of solutions. You can try to solve this

Total Pages: 1330 1 .... 101 102 103 104 105 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.