Vulnerabilities+data

Showing results 1 to 20 of 53

May 22, 2013 By Identity Finder

Identity Finder Professional Edition

Identity Finder Professional Edition is ideal for individuals and power users looking to protect their sensitive information on personal...

March 3, 2015 by

IoT devices not secured by design

Internet of Things devices are not originally built to be robust against attacks, resulting in vulnerabilities that can lead to severe repercussions if left unchecked, such as data that's being collected and acted upon in Singapore's smart nation plan.

October 24, 2005 By Susels

Virtual Encrypted Disk

VE-Disk is a small, compact program for creating encrypted virtual disks. It helps you keep your sensitive and vulnerable data and...

May 7, 2014

Dropbox drops the security notification ball, again

Yet another failure to tell users directly about security vulnerabilities highlights the need not just for mandatory data breach notification laws, but mandatory notification of security and privacy risks.

August 14, 2013 by

Microsoft pulls buggy Exchange Server patch

MS13-061, released on Tuesday to address 3 vulnerabilities in an Oracle component in Exchange Server, causes data to be inaccessible in Exchange Server 2013. Microsoft has pulled the update and released guidance for how to work around the problems it causes.

April 10, 2011 by

Inside CERT Australia

The Australian Government has a list of software holes that are so sensitive they're kept hidden from the public. These weaknesses are being used by criminals to steal our money and our data. These vulnerabilities are also the bait with which cyber-criminals are caught.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular