The news reported that a top programmer in an infrastructure firm had outsourced his duties to a Chinese consultancy while he goofed off during work. Behaviour like this in your business can put it in serious risk for losses. How can you reduce the chances of such a thing happening? I have one way that may shock you.
Java 7 Update 6 0-Day Exploit in the Wild
MySQL Vulnerability Allows Attackers to Bypass Password Verification
CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks
The US Computer Emergency Response Team (US-CERT) has advised that some 64-bit operating systems and virtualization software running on Intel 64 CPU hardware are vulnerable to a local privilege escalation attack. An attacker may exploit the vulnerability to escalate privileges or gain access to the host machine from a guest virtual machine.
After many months in development, Interxect Services has finally launched our website and we could finally get rid of that “Coming Soon” page. We really like the layout and hope you do to. There is still more to come, such as articles and whitepapers, so check back regularly. Please sign up for our newsletter so […]