Tagged: networks

Defending the Hacker Ethic At Black Hat 2015 0

Defending the Hacker Ethic At Black Hat 2015

This year’s Black Hat keynote speaker, Jennifer Granick, gave her talk to applause yesterday rather than the boos and/or skepticism that have greeted other recent speakers. In a nutshell, she delivered a powerful call to action to preserve the…

Best Practices to Protect You, Your Network, and Your Information 0

Best Practices to Protect You, Your Network, and Your Information

Original release date: July 31, 2015 The National Cybersecurity and Communications Integration Center (NCCIC) and its partners responded to a series of data breaches in the public and private sector over the last year, helping organizations through incident response actions, conducting damage assessments, and implementing restoration and mitigation actions. During NCCIC’s recent work, following best practices proved extremely effective in protecting networks, the information residing on them, and the equities of information owners. The recently updated National Institute of Standards and Technology Cybersecurity Framework highlights best practices

VU#810572: CUPS print service is vulnerable to privilege escalation and cross-site scripting 0

VU#810572: CUPS print service is vulnerable to privilege escalation and cross-site scripting

Vulnerability Note VU#810572 CUPS print service is vulnerable to privilege escalation and cross-site scripting Original Release date: 09 Jun 2015 | Last revised: 09 Jun 2015 Overview CUPS implements the Internet Printing Protocol (IPP) for UNIX-derived operating systems. Various versions of CUPS are vulnerable to a privilege escalation due to a memory management error