Results »

Developers X.Org reported identifying 30 vulnerabilities affecting various client libraries X11, as well as the components of DRI-Mesa. The problems are due to lack of proper validation transferred within the X11 protocol data sets and manifest themselves as going beyond the boundaries of the buffer and integer overflows when processing your request correctly. Many of […]

Independent specialists in IT security have found serious vulnerabilities in software engines of some very popular games, first person shooters. Identified bugs allow an attacker to compromise a serveroy operators of games, and computers themselves gamers. Security experts Luigi Auriemma and Donato Ferrante of the company Revuln found faults in the subsystem with computer memory […]

Running Microsoft Windows OS means you should be ready to deal with unpredictable events at any point of time, especially if web surfing is something that you do on a daily basis. The list of vulnerabilities in Windows seems to be infinite, and it is constantly replenished with more and more items. So if you’ve […]

Microsoft Patch Tuesday – November 2015 November 10, 2015 under the “Patch Tuesday” Microsoft released 12 security bulletins, which correct a total of 49 vulnerabilities in the company’s products. Four of them are critical, the other eight – important. Critical patches are for flaws in Windows, Internet Explorer, and the new browser Edge, allowing remotely […]

The internet is a perfect place for thieves to attacks. The Target data breach that took place during the 2013 holiday season served to kick off an entire year of major security problems for everyone from retail stores to hospitals. It’s becoming increasingly apparent that personal data is at risk in nearly every public transaction.

Internet has always been the most important part of our day to day activities. Internet has become inevitable for every sphere of life, thus creating a space of comfort and saving a lot of time. When Internet was under the initial phase of development, the designers did not anticipate that the network users would be […]

The Second Life of Windows XP As of April 8, 2014, Microsoft no longer supports the Windows XP and no provides updates for this operating system. In this article, we will give recommendations of the “Survival” for anyone who wants to continue to use his favorite system. Just note: we do not offer to use […]

A developing technology The use of mobile phones to connect to the Web is over twenty years old, just a year older than the Web itself, but the danger of threats to one’s identity and personal computer files from online by viruses and malware have only recently begun to be understood, and similar threats to […]

Security in cloud hosting terms indirectly addresses availability, confidentiality and integrity. Security is one single aspect that can cause the undoing of cloud hosting. As it is entirely integrated with the internet, it inevitably faces loads of challenges and vulnerabilities. Most importantly, it is in the hands of the cloud hosting providers to calmly deal […]

Norton Security Solutions updated for compatibility with the new features Windows 8.1, enhanced security and usability. Norton by Symantec announced the release of an updated version of its security solutions: Norton 360 Multi-Device, Norton 360, Norton Internet Security and Norton AntiVirus. The products contain patented improvements in the five levels of protection, which increased productivity, […]