Showing results 1 to 20 of 30

January 3, 2011 By Databilio

Report Inverter for Excel

Report Inverter for Excel is an add-in that enables you to convert text reports into a data table by using a true user-friendly interface....

May 18, 2011 by

New exploit found in PSN restore

Just days after most services for the PlayStation Network (PSN) were brought back online, it appears a new exploit has been discovered that allows hackers to change users' passwords with the data stolen during the break-in to the service last month.

July 31, 2009 by

Apple patches iPhone SMS flaw

Apple has plugged an SMS flaw that would enable an attacker to take complete control over an iPhone.Researchers Charlie Miller and Collin Mulliner said at the Black Hat security conference that an attacker could use the SMS exploit to make calls, swipe data and send text messages.

April 2, 2009 by

Attackers pounce on Microsoft PowerPoint zero-day

Attackers are using rigged PowerPoint files to exploit an unpatched vulnerability in Microsoft's presentation software, according to warning late Thursday from the software maker.In a pre-patch advisory, Microsoft described the attacks as "limited and targeted," the kind of language that suggests it is being used to steal data from corporate or government networks.

March 23, 2008 by

Microsoft confirms Word attacks

Microsoft has confirmed reports of vulnerability in Word that allows an attacker to exploit a system via the Microsoft Jet Database Engine, which shares data with Access, Visual Basic and third party applications.Microsoft in its advisory said the potential for attack is "very limited.

January 17, 2008 by

IBM and Kapow on how enterprises exploit application mashups and lightweight data access

This current wave is really driven by line of business getting IT in their own hands. They’ve started using it, and that’s created the chaos, but chaos is created because there is a need. The best thing that’s happening now is acknowledging that line-of-business people need to do their own thing. We need to give them the tools, environments and infrastructure so they can do it in a controlled way -- in an acceptable, secured way.

September 21, 2007 by

Developing enterprise applications for mobile devices remains way too hard

These nifty clients should go quite a way to making enterprise mobility far easier by allowing developers to exploit them with fewer interface and connectivity variables to manage. But the converged client still needs a back-end or middleware counterpart to help coordinate an enterprise's data, logic, and security needs. Sybase is hard at work on what may prove to be a game changer for such enterprise mobility middleware -- especially when coupled with a converged device such as the iPhone.

January 22, 2006 by

Guide to hardware-based DEP protection

When the WMF exploit hit the wild and existing workarounds were tacky and the official Microsoft patch a week away, the DEP or Data Execution Prevention feature shined through when it was completely enabled and supported by NX or XD capable hardware.  While NX and XD also support other operating systems like Windows 2003 Server with SP1, BSD, and Linux, the vast majority of users will use it through Windows XP SP2.


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular