Security > Application security

Dell Data Protection | Threat Defense endpoint security solution

02 June, 2016

The Dell Data Protection | Threat Defense product offering is a threat prevention solution specifically designed for the needs of growing businesses with limited or no in-house IT staff.


Don't fall prey to rooting and jailbreaking

02 June, 2016 by Alex Manea*

There are simple steps you can take to prevent yourself and your business from falling prey to rooting and jailbreaking.


Vulnerabilities found in half of top 50 PC applications

17 March, 2016 by Dylan Bushell-Embling

An annual study from Flexera's Secunia Research shows that 2048 vulnerabilities were found among 25 of the top 50 applications found on private PCs in 2015.


Researchers find critical flaw in Microsoft's EMET toolkit

25 February, 2016 by Dylan Bushell-Embling

Microsoft has had to patch its Enhanced Mitigation Experience Toolkit, designed to make user-mode programs more secure, after FireEye researchers found a simple method to disable it completely.


Check Point Software Technologies SandBlast Agent security solution

12 February, 2016

Check Point Software Technologies has launched Check Point SandBlast Agent, which defends endpoints with advanced protection technologies, both on premise and remotely. Forensic analysis accelerates understanding of the full attack to maximise response capabilities.


Cupid's arrow could sting for CIOs this Valentine's Day

10 February, 2016 by Dylan Bushell-Embling

A study of 25 of the most popular dating apps on iOS found that many could violate companies' BYOD, privacy and confidentiality or risk profile policies.


Major bug found in Linux kernel

22 January, 2016 by Dylan Bushell-Embling

A potentially serious vulnerability in the Linux kernel has been uncovered, while Apple has issued patches for nine vulnerabilities in OS X and iOS.


Apple's OS X had most vulnerabilities in October

04 December, 2015 by Dylan Bushell-Embling

Apple and Adobe products topped the October list of the top 20 most vulnerable products in a report from Flexera, but Microsoft had the most products represented in three monthly top 20s due to Flash flaws.


FireEye discovers another iOS vulnerability

05 November, 2015 by Dylan Bushell-Embling

FireEye researchers have uncovered a potentially backdoored ad library in use in thousands of iOS apps that could enable attackers to compromise sensitive user data, such as audio and stored files.


iOS exploit found, $1m bounty paid

04 November, 2015 by Dylan Bushell-Embling

Government agencies may soon be able to pay for a method to spy on iOS owners by exploiting a method that allows remote jailbreaking and code execution on untethered iOS devices.


Consumers confident they can handle IoT security

16 October, 2015

Is the Internet of Things safe? ISACA's latest survey suggests a major confidence gap about the security of connected devices between the average consumer and cybersecurity professionals.


SQL Server 2005 approaching end of life

15 October, 2015 by Dylan Bushell-Embling

Companies still using Microsoft's SQL Server 2005 will have less than six months to upgrade before the ageing operating system reaches its end of extended life.


Dangerous iOS malware discovered in the wild

22 September, 2015 by Dylan Bushell-Embling

At least 39 popular apps on the Chinese iTunes store are infected with a powerful and insidious malware that has made unprecedented attacks on the iOS ecosystem, analysis indicates.


Security round-up: Symantec to sell Veritas

12 August, 2015 by Dylan Bushell-Embling

Symantec has announced a US$8bn deal to sell its Veritas unit, while Oracle and the UK's Export Control Organisation have come under fire from the security community.


Microsoft still earning millions from Win XP support

25 June, 2015 by Dylan Bushell-Embling

The US Navy has agreed to pay Microsoft US$9m to continue supporting its Windows XP installations, while HP's ZDI has published details of an exploit in IE that could allow attackers to bypass Windows' ASLR security feature.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd