165 Results for

cert

Article

Fake Turkish site certs create threat of bogus Google sites

After a Turkish Internet certificate authority "mistakenly" issues two unauthorized e-documents used to verify Web site authenticity, another organization creates a fraudulent certificate that could let it impersonate various Google sites. Browser makers have responded.

By January 3, 2013

Article

MetaCert aims to block porn throughout the home (podcast)

Instead of blocking bad stuff at individual computers, Metacert will filter out sites it identifies as nasty across your entire home network. Larry Magid talks with CEO Paul Walsh.

By August 6, 2012

Article

US-CERT uncovers JavaScript security vulnerability in Safari

The United States Computer Emergency Readiness Team (US-CERT) has found a security hole in Safari, with which a hacker could run arbitrary code at the privilege level of the current user account if the victim visits a malicious Web page.

By May 11, 2010

Article

US-CERT warns about free BlackBerry spyware app

Creator of PhoneSnoop program that can be used to eavesdrop on BlackBerry calls releases a new program to help protect users from stealth spyware apps.

By October 27, 2009

Article

US-CERT warns of SAP vulnerability

A "highly critical," unspecified hole in the graphical user interface client for the German company's ERP software can cause IE to crash in an exploitable manner, advisories warn.

By November 11, 2008

Article

Google plugs open-source security holes with oCERT

Google has launched a security response team called oCERT to help improve open-source security. It's a welcome addition to Google's portfolio of open-source efforts.

By May 8, 2008

Article

Additional 'Code Red' warning from CERT

Additional 'Code Red' warning from CERT

By July 30, 2001

Article

CERT Alert: Malicious HTML tags in web pages

CERT Alert: Malicious HTML tags in web pages

By February 3, 2000

Article

Belkin WeMo smart home networks in danger of hacks

Researchers warn that more than 500,000 home automation devices have vulnerabilities that would allow attackers to remotely take control of thermostats, lighting, sprinkler systems, and more.

By February 18, 2014