Websense: Android security concerns

According to the latest Websense research, Android has encountered more security problems than other competitors. Compared with iOS and WP systems, Android has more opportunities to access unofficial market applications, in addition, its

JBoss Application Server Console Cross-Site Scripting Vulnerability

Release date: 2011-12-02Updated on: 2011-12-05 Affected Systems:JBoss Group JBoss Application Server 7.xDescription:--------------------------------------------------------------------------------Bugtraq id: 50885Cve id: CVE-2011-3606 Jboss is a

HP Network Automation remote Illegal Access Vulnerability

Release date:Updated on: Affected Systems:HP Network Automation 9.10HP Network Automation 9.0HP Network Automation 7.6HP Network Automation 7.6HP Network Automation 7.2Unaffected system:HP Network Automation 9.10.2Description:-----------------------

HP ProCurve 5400 zl Switches 'compact Flash card' Security Vulnerability

Release date: 2012-04-10Updated on: 2012-04-28 Affected Systems:HP E5412 zl SwitchHP E5406 zl SwitchHP Management Module 5400 series zl switch J8726ADescription:--------------------------------------------------------------------------------Bugtraq

VLC Media Player 'swf 'file Stack Buffer Overflow Vulnerability

Release date: 2012-6 6Updated on: Affected Systems:VideoLAN VLC Media Player 2.0.4Description:--------------------------------------------------------------------------------Bugtraq id: 56861 VLC Media Player is a multimedia Player named VideoLAN

Adobe Shockwave Player Multiple Vulnerabilities (APSB13-12)

Release date:Updated on: Affected Systems:Adobe Shockwave Player Description:--------------------------------------------------------------------------------Bugtraq id: 58971CVE (CAN) ID: CVE-2013-1383, CVE-2013-1384, CVE-2013-1385,

The NSA has long been exploiting the Heartbleed vulnerability and denied

BI Chinese site April 12 According to some media sources, for many years, the NSA (National Security Agency) has been using the huge security vulnerability "Heartbleed (Heartbleed)" to collect information about Internet users. OpenSSL TLS heartbeat

EBay was attacked and urged 0.145 billion million users to change their passwords

According to Reuters, May 23, eBay said on Wednesday that the cyber attacks it launched three months ago have threatened customer data security. The company urged 0.145 billion million users to change their passwords. From the end of February this

Free system security door-QQ Security Center

This is not false. Due to the large user base of QQ, the attack on QQ on the Internet has never been stopped. How can I protect my QQ number and system while surfing the internet, it has always been a heart disease for many friends. With the

Tips for System Security Protection (IIS) Web Servers

Generally, most Web sites are designed to provide visitors with instant information access in the most acceptable way. Over the past few years, more and more hackers, viruses, and worms have brought serious security problems that have severely

Step by step: technologies and strategies against spyware threats

Author: Legend: BKJIA Spyware is terrible, and its threats are serious and disturbing IT staff. Protection of enterprise security environments requires highly professional anti-virus technology to protect all login points. Advanced kernel-level

Malicious PDF file detection ideas

 Author: CryinConnection: http://hi.baidu.com/justear/blog Overview For PDF File Parsing, you must first familiarize yourself with all types of PDF files. It seems that all official PDF files are in English. In this way, you can't do it. If you are

Anti-Virus is actually very simple-Summary of a college student's three years of non-toxic experience

I am a college student. In my spare time, I like to study computer knowledge, especially computer security knowledge. I am also a soft trial mad, I always love to try out the latest anti-virus software and security protection software. When a

DNS spoofing technology

Author: Spacefox, Secure Sphere CrewConan, OS3 (Open Source Software Society)/CICC Singapore (Center of International Cooperation for Computerization in Singapore)Source: evil baboons Information Security Team (www.eviloctal.com) Overview: What is

Mobile phone rumor Terminator: Is a smartphone really infected with viruses?

With the rapid popularization of smartphones such as iPhone and Android and their increasingly powerful functions, the topic about mobile phone viruses is also getting hotter and hotter, and various anti-virus software for mobile phones are emerging

Five Things about Windows Security Account Manager

Passwords are a basic element of computer security, but researchers have found that they are involved in a large number of security vulnerabilities. However, it is worth learning how Windows manages and executes passwords through the security

Juning address of Intranet access in Juniper SRX Destination NAT

  Network device:Juniper SRX series Firewall Network Topology:  650) this. width = 650; "onclick = 'window. open (" http://blog.51cto.com/viewpic.php? Refimg = "+ this. src) 'border =" 0 "alt =" "src =" http://www.bkjia.com/uploads/allimg/131227/0Z54

Use the latest open-source software to build a log management system

We already know that OSSIM is one of the few open-source SIEM/security management platforms, and there is no integrated log management (LM) system yet. However, if you want to, you can DIY a log management system and use the latest technologies.

How should we deal with web Application Security Threats?

In the face of web Application Security Threats, how should we deal with the content described in several articles? With the emergence of a series of new Internet products such as Web2.0, social networks, and Weibo, web-based Internet applications

How to Ensure Web Application Security during the delivery cycle (2)

Benefits of integrated synthesis testing for Web Applications Software Testing integrated synthesis analysis methods can greatly improve efficiency. A specific plug-in integrating the development environment will issue a warning to the coding staff

Total Pages: 1330 1 .... 82 83 84 85 86 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.