0
Cisco offers $300k for security solutions Cisco offers $300k for security solutions

Cisco has launched a new competition and is calling on "visionaries, innovators, and implementers" to propose practical soluti...

Read more »

0
Tor develops its own anonymous Messenger Tor develops its own anonymous Messenger

The Tor Foundation is moving forward with a plan to provide its own instant messaging service. Called the Tor Instant Messaging Bundle, ...

Read more »

0
Cross-Site Request Forgery(CSRF) Vulnerability  in HP Service Manager Cross-Site Request Forgery(CSRF) Vulnerability in HP Service Manager

Potential security vulnerabilities have been identified with HP Service Manager. The vulnerabilities could be remotely exploited result...

Read more »

0
Install & Configure HAProxy on CentOS for Load Balancing Install & Configure HAProxy on CentOS for Load Balancing

HAproxy is open source proxy that can be used to enable high availability and load balancing for web applications. It was designed es...

Read more »

0
Remote Code Execution Vulnerability in Adobe Flash Player Remote Code Execution Vulnerability in Adobe Flash Player

A remote code execution vulnerability has been reported in Adobe Flash Player. The vulnerability is due to a double-free condition whe...

Read more »

0
EC-Council Hacked 2014 EC-Council Hacked 2014

The security company EC-Council which provides multiple certificates like the Certified Ethical Hacker has been hacked by a hacker th...

Read more »

0
Top 10 Open Source security tools Top 10 Open Source security tools

The layered-security approach centers on maintaining appropriate security measures and procedures at five different levels within your I...

Read more »
 
 
Top