28 Results for

rapid7

Article

Rapid7 issues QuickTime/Darwin Streaming Server Security Advisory; some flaws remain

Rapid7 issues QuickTime/Darwin Streaming Server Security Advisory; some flaws remain

By July 23, 2003

Article

Security in 2015: Will you care about the next big breach?

From Target to Home Depot to JPMorgan, this year was a bad one for massive security breaches. Expect more of the same next year.

By December 28, 2014

Article

Apple's Shellshock patch for Macs is incomplete, says security researcher

Apple just released a patch for Shellshock, a bug that could give hackers access to Macintosh computers, but a security specialist says Apple fixed only two out of three security holes.

By September 30, 2014

Article

'Vast majority' of Mac users safe from Shellshock Bash bug, Apple says

Apple says users of its OS X operating system are "safe by default" from the new security vulnerability, which has been described as bigger than Heartbleed.

By September 26, 2014

Article

​'Bigger than Heartbleed': Bash bug could leave IT systems in shellshock

Just months after Heartbleed made waves across the Internet, a new security flaw known as the Bash bug is threatening to compromise everything from major servers to connected cameras.

By September 24, 2014

Article

Hackers breach Healthcare.gov, but no personal data stolen

Hackers infiltrated the US government's healthcare portal, but did not steal any data uploaded by customers.

By September 4, 2014

Article

Internet Explorer exploit release could trigger a surge in attacks

While Microsoft has yet to issue a permanent patch for a known exploit, the code could become widely available to cybercriminals after being integrated into an open-source testing tool.

By October 1, 2013

Article

Top Wi-Fi routers easy to hack, says study

The most popular home wireless routers are easily hacked and there's little you can do to stop it, says a new study by research firm Independent Security Evaluators.

By April 17, 2013

Article

UPnP networking flaw puts millions of PCs at risk

Security researchers say that the danger stems from widely used technology found in routers and other standard networking equipment.

By January 29, 2013

Article

New Internet Explorer weakness already exploited in attacks

Researchers say a previously unknown hole in IE has already been used to deliver a trojan in real-world attacks.

By September 17, 2012