Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

By Michelle Drolet . 29 Sep 2014

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer … Continue reading Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

Top 10 things to know about mobile security

By Michelle Drolet . 27 Jan 2014

10. Malware is on the rise The threat of malware on mobile platforms is growing steadily as more and more cyber criminals target mobile devices in increasingly sophisticated ways. 9. Byod is a challenge There are obvious benefits to the BYOD (Bring Your Own Device) trend, but it also creates IT challenges and exposes your … Continue reading Top 10 things to know about mobile security

Phone 5S Phishing Mail Arrives in time for launch.

By Michelle Drolet . 11 Sep 2013

While millions of mobile users are anticipating the launch of the new iPhone (5S and 5C), cybercriminals are already making their move to distribute spam that promise to give away the said devices for free, in the guise of a contest. We saw samples of spammed messages that attempted to spoof an Apple Store email … Continue reading Phone 5S Phishing Mail Arrives in time for launch.

Tags