AMD chips are exposed to security vulnerabilities. Hackers can easily control network devices,

AMD chips are exposed to security vulnerabilities. Hackers can easily control network devices, AMD chips are exposed to security vulnerabilities. Hackers can easily control network devices. According to a study published by CTS Labs, an

Crashplan Windows client Local Elevation of Privilege Vulnerability repair suggestions, crashplan Client

Crashplan Windows client Local Elevation of Privilege Vulnerability repair suggestions, crashplan Client Crashplan Windows client Local Elevation of Privilege Vulnerability repair suggestions, this article is about CrashPlan Windows client 4.8.2.4,

Cisco Nexus 3000/3500 switch default credential Vulnerability (CVE-2016-1329)

Cisco Nexus 3000/3500 switch default credential Vulnerability (CVE-2016-1329)Cisco Nexus 3000/3500 switch default credential Vulnerability (CVE-2016-1329) Release date:Updated on:Affected Systems: Cisco Nexus 3000 Series SwitchesCisco Nexus 3500

WifiCredService abuse on Samsung Android 5 causes Remote Code Execution

WifiCredService abuse on Samsung Android 5 causes Remote Code Execution This article analyzes the Samsung Android5 device vulnerability [0] recently disclosed in the Google vulnerability rewards program, which was mined by Google's Project Zero Team

The design defect of a station in the travel network of qinglv leads to a large amount of sensitive information leakage (Order/member number/name/mobile phone number/ID card number/email/address)

The design defect of a station in the travel network of qinglv leads to a large amount of sensitive information leakage (Order/member number/name/mobile phone number/ID card number/email/address) Qinglv Holdings Co., Ltd. (hereinafter referred to as

Symantec Endpoint Protection Authentication Bypass Vulnerability (CVE-2015-1486)

cve

Symantec Endpoint Protection Authentication Bypass Vulnerability (CVE-2015-1486)Symantec Endpoint Protection Authentication Bypass Vulnerability (CVE-2015-1486) Release date:Updated on:Affected Systems: Symantec Endpoint Protection Manager

Samsung Galaxy S5 fingerprint data leakage Vulnerability

Samsung Galaxy S5 fingerprint data leakage VulnerabilitySamsung Galaxy S5 fingerprint data leakage Vulnerability Release date:Updated on:Affected Systems: Android Samsung Galaxy S5 Description: Samsung Galaxy S5 is a Samsung 4G smartphone

Adobe Reader and Acrobat Security Restriction Bypass Vulnerability (CVE-2014-9150)

Adobe Reader and Acrobat Security Restriction Bypass Vulnerability (CVE-2014-9150) Release date:Updated on: 2014-3 3 Affected Systems:Adobe Acrobat Adobe Reader Description:Bugtraq id: 71366CVE (CAN) ID: CVE-2014-9150 Adobe Reader (also known as

Adobe Flash Player and AIR Memory Corruption Vulnerability (CVE-2014-0544)

Adobe Flash Player and AIR Memory Corruption Vulnerability (CVE-2014-0544) Release date:Updated on: Affected Systems:Adobe Flash Player Adobe Flash Player Adobe Flash Player Adobe AIR Adobe AIR Description:--------------------------------------------

Samsung Smart TV attached storage device read Vulnerability

Release date:Updated on: Affected Systems:Samsung Smart TV LED 3DDescription:--------------------------------------------------------------------------------Samsung Smart TV is a new generation of TV products. It can obtain program content from

How hackers conduct springboard attacks and defense

During attacks, hackers use other systems to achieve their goals, such as attacks against the next goal and exploitation of computers themselves. This article describes how hackers use computers that are encroached on and how security administrators

Research on potential Email Security Risks and prevention technologies

With the popularization and importance of security education, especially the security education, anti-virus software and personal firewall are strictly required for personal computers. The virus library and system vulnerability patches are also

HOWTO: configure the name server locally and enable DNSSEC

Note: If you have any questions about the content described in this article, contact Jimmy Xu. DNSSEC has been released for a short time, and the root server has been supported. The. org domain and some ccTLD have been fully deployed. However, it is

Using sftp in Windows to create secure transmission

As we all know, the biggest difference between Windows and Linux systems lies in its non-open-source nature. Therefore, in Windows, we transfer files and share resources through FTP, compared with the previous TFTP protocol, FTP provides necessary

IOS APP black box/gray box audit checklist

This article describes how to perform a basic security audit for an iOS application, mainly through manual audit of black box or gray box. Note that the red font is the checklist for security audit.1. IPA installation package analysis (Static

Correctly set php-fpm sub-process users to improve website security and prevent Trojans

Correctly set php-fpm sub-process users to improve website security and prevent Trojans Address: http://www.myhack58.com/Article/60/61/2013/37209.htm According to continuous feedback in the production environment, PHP websites are found to be

Analysis of Anti-virus detection and removal techniques of recent js scams

Analysis of Anti-virus detection and removal techniques of recent js scams Recently, many netizens have reported that hackers have been blackmailed (also known as the "Locky ransomware"), and files, images, and other important information on

Cleverly uses the Linux system IP address to disguise and prevent black

Firewalls can be divided into several different security levels. In Linux, because there are many different firewall software options, the security can be low and high, and the most complex software can provide almost no penetration protection

Security-powered anti-virus software engine-related technologies

Virus and Anti-Virus products are born enemies. Due to the endless existence of viruses, this field of Anti-Virus products will naturally be divided by many vendors, as a result, multiple Anti-Virus engine technologies have been developed. The

Interview with IBM Greater China Mobile Internet, information security, IBM Global Technical Director, IoT technology general manager Lin yuzhen

Interview with IBM Greater China Mobile Internet, information security, IBM Global Technical Director, IoT technology general manager Lin yuzhen   Lin yuzhen, general manager of IBM Greater China Mobile Internet, information security, IoT

Total Pages: 1330 1 .... 15 16 17 18 19 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.