Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.
A vulnerability patched in the web-based versions of encrypted communications services WhatsApp and Telegram would have allowed attackers to take over accounts by sending users malicious files masquerading as images or videos.
APIs, integration, containers and a range of other technologies are all creating new opportunities to retool enterprise IT. However, using these new tools to forge a coherent platform strategy that is flexible yet robust remains as
Google has expanded its Safe Browsing service, allowing Google Chrome on macOS to better protect users from programs that locally inject ads into web pages or that change the browser's home page and search settings.
The rise of BYOD and the Internet of Things (IoT) are bringing new flexibility and functionality to organizations of all sizes - and unfortunately, also new Wi-Fi vulnerabilities and attack vectors that put critical assets within your
Organizations that work with many 3rd parties in a cloud-based environment are challenged with finding a scalable and elastic security solution that also meets their partners' regulations and remains easy-to-use. Register with AWS for
Register with AWS to learn how Check Point vSEC on AWS provided customers with an advanced threat prevention solution to enable secure application delivery. Learn how to migrate your applications and workloads to AWS with vSEC's