14.1 C
London
Thursday, November 23, 2017
Home Tags Protocol

Tag: Protocol

Skype falls victim to China's strict cybersecurity laws and Internet regulations.
Oracle pushed out an emergency update for vulnerabilities dubbed 'JoltandBleed' affecting five of its products that rely on its proprietary Jolt protocol.
Set DNS server to 9.9.9.9, and (known) malware and phishes wonrsquo;t be able to phone home.
In a new twist to an old attack, threats actors are increasingly using the remote access protocol to install ransomware, Sophos says
Attackers are using Microsoft’s Dynamic Data Exchange protocol to download and install malware. Microsoft has warned about the issue, and given users guidance on how to protect themselves, but does not consider it a vulnerability.
"JoltandBleed" memory leak gives attackers full access to business applications.
A security researcher explains how WPA2 Enterprise wireless security can be bypassed and why the EAP-TLS wireless authentication protocol should be more widely deployed to help mitigate risks.
Boffins write browser extension for anonymous authentication Boffins have harnessed privacy-preserving crypto to create a browser extension that allows users to authenticate to services without being tracked.…
Google this week finally addressed the KRACK vulnerability in Android, three weeks after the WPA2 protocol flaw was publicly disclosed.
The FCC wants to block Minnesota from regulating Charterrsquo;s VoIP phone service.
A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in anbsp;denial of service (DoS...
A vulnerability in the Simple Network Management Protocolnbsp;(SNMP) subsystem of Cisconbsp;Wireless LAN Controllers could allow an authenticated, remote attacker to cause an affected device to restart, resulting in a denial of servicenbsp;(DoS)...