Who Can Read My Data in the Cloud?

For the sake of your compliance, you hope that the answer is “nobody”! For most organizations, confidentiality is the greatest concern. The most worrying thing about using cloud technology is storing your data on someone else’s hardware. But how big of a risk is this, really? Stored data should be encrypted. However, how much of […]
Read More ›

Exploit vs. Antivirus: It’s No Contest

In a recent blog, we talked about the recent Java vulnerability and how it was still kicking around.  The flaw has been identified as CVE-2012-0507 in the Common Vulnerabilities and Exposures database.  You might be thinking that you are still safe, as you have antivirus.  Let’s find out how well it protects you. As of […]
Read More ›

LinkedIn Accounts May Have Been Hacked

It is a good time to change your LinkedIn password. Lifehacker reports that up to 6.5 million accounts may have been compromised. Just to be safe change your LinkedIn password now. I did. One report at The Verge notes that part of the issue may be the type of hash used. I will discuss these issues in […]
Read More ›

Injections (Not the Kind from the Doctor!)

Dark Reading reported in early May of this year that injection attacks are on the rise again. Injection attacks were also number one on the OWASP (Open Web Application Security Project) Top Ten for 2011. The OWASP Top Ten project describes itself  as “a broad consensus about what the most critical web application security flaws […]
Read More ›

Patching the Cloud

Vulnerability CVE-2012-0056 is a nasty one if you’re running a Linux kernel release 2.6.39 through 3.2.1. The exploit is a privilege escalation attack, meaning that the attacker has to get a foothold on your system. But once the attack has an unprivileged process on your system, its privileges can be elevated to root. Game over. […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.