(Sep 6) Defcon 26 provided individuals and organizations with valuable tips and insight on security and the latest and most effective defenses. Here are some security-related highlights from the event. …
Archive for September 6th, 2018
(Sep 5) Zhaoyang Wu discovered that cURL, an URL transfer library, contains a buffer overflow in the NTLM authentication code triggered by passwords that exceed 2GB in length on 32bit systems.
(Sep 6) transfig could be made to execute arbitrary code if it received a specially crafted FIG file.
(Sep 4) Updated samba packages that fix several security issues and provide several bug fixes and an enhancement are now available for Red Hat Gluster Storage 3.4 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact
(Sep 4) An update for collectd is now available for Red Hat Gluster Storage 3.4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
This is a guest post from Tim Hollis, VP of Operations at JetApps! JetApps has returned this year to exhibit at the cPanel Conference, October 1st – 3rd in Houston, Texas. If you haven’t already, take a look at the agenda, book your room (discounted rates apply until September 9th!), and get registered! As a software company, nothing makes us happier here at JetApps than hearing stories of how JetBackup has …
Find out what the most common security attacks on servers are and how you can successfully protect your web hosting server from them.
The post WordPress business owner, Francesca Marano’s tips for success appeared first on Plesk.