News & Highlights Archive
News & Highlights
(Source: XDA Developers) The company prides itself in how secure their software is (even when it’s built on top of Android) and they were even able to release their software update before …
Read More
News & Highlights
(Source: Naked Security) .. remains in dispute between Cisco Talos researchers and the software giant. … A specially crafted web page can cause a content security policy bypass …
Read More
News & Highlights
(Source: GuruFocus.com) Cavium™, Inc. (NASDAQ: CAVM), a leading provider of semiconductor products that enable secureand intelligent processing for enterprise, data center, wired …
Read More
News & Highlights
(Source: BleepingComputer) Cisco has initiated a mass security audit of all its products that incorporate a … all the software products for four Apache Struts security bugs disclosed last week.
Read More
News & Highlights
(Source: Wccftech) Security researchers believe that this bug could allow hackers to perform malicious actions by tricking AV software that blindly rely on a particular Windows API.
Read More
News & Highlights
(source: BW Businessworld) The finely tuned software runs swimmingly on the mid-range hardware — the … or those who value software security above all other reasonable demands from a …
Read More
News & Highlights
(Source: CRN) HP Imaging and Printing President Enrique Lores said the company’s printer software security advances are a major differentiator versus competitors. “We have …
Read More
News & Highlights
(Source: eWeek) Torvalds added that in the Linux kernel, there are a lot of security checks, … Fuzz testing involves generating random inputs for software in an attempt to trigger …
Read More
News & Highlights
(Source: Nasdaq) Identiv, Inc. is a global provider of physical security and secure identification. Identiv’s products, software, systems, and services address the markets for physical …
Read More
News & Highlights
(Source: Motherboard en_us) Researchers from security firm Check Point Software Technologies developed a technique that uses Bash, the Linux command-line interface—or shell—that’s …
Read More