Plato Data Intelligence.
Vertical Search & Ai.

Tag: Exploit

TLS vs SSL: The Difference May Surprise You!

Reading Time: 3 minutesWhen you work with SSL (Secured Sockets Layer) to secure your web site or other types of communication, you may...

ADVISORY: POODLE Threat Requires Immediate Attention

Reading Time: 3 minutesThis has been a rough year in Internet Security. There has been a deluge of data breaches, especially against Point-of-Sale...

Drupal Reveals Critical Bug

Reading Time: 1 minuteDrupal has released a security advisory to address an application program interface (API) vulnerability that could allow an attacker to...

Oracle Battles BASH Bug with Much Work Left to Do

Reading Time: 1 minuteOracle has released security updates to address BASH bug vulnerabilities found across multiple products. However, Oracle also included in its...

Microsoft’s August Advisory Includes Critical Security Updates

Reading Time: 2 minutesIf it’s the second Tuesday of the month, it is time for Microsoft’s Security Updates, aka “Patch Tuesday”. The Microsoft August...

E-Commerce in the Crosshairs: How to Keep Your Site Secure

Reading Time: 6 minutes If you have an e-Commerce site you are in crosshairs of hackers. Why? Because you are the goose with the...

Penetration vs VulnerabilityTesting: Do You Know the Difference?

Reading Time: 2 minutesEvery time you turn around, it seems there is another high profile data breach in the news that involves the...

Mozilla Releases Critical Security Updates for Firefox

Reading Time: 1 minuteThe Mozilla has released security updates to address multiple vulnerabilities in their Firefox browser, including 11 critical fixes. Among the critical...

Many Servers Vulnerable to Heartbleed. Act Now!

Reading Time: 3 minutes Various news reports have confirmed that many web servers are still vulnerable to the Heartbleed bug, which effects Apache servers...

The Internet of Things: A Tech Dream or Internet Security Nightmare?

Reading Time: 2 minutesThe Internet of Things (IoT) is a loose term for the concept that today’s computing and Internet technologies can be...

Comodo AV Labs Identifies Phishing Scam Targeting Gamers

Reading Time: 6 minutesContributors: Ionel Pomana, Kevin Judge Video games have played an important role in the history of computers and are a...

Adobe Release Security Updates for Flash Player and Air

Reading Time: 1 minuteAdobe Flash has been a frequent target of hackers who have found numerous ways to exploit flaws in the software....

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?