Read more about hardware
Bookmark and Share
  • Seagate acknowledges NAS 0-day, announces patch

    09.03.2015

    After security researcher OJ Reeves publicly revealed the existence of a remote code execution zero-day flaw affecting Seagate's Business Storage 2-Bay NAS line of products and published a Metasploit module and a standalone Python script that exploit the vulnerability, the company has finally commented the situation more extensively and has announced a patch: "After careful analysis, Seagate has confirmed that the vulnerability on our Business Storage NAS products is low risk and affects only those Business Storage NAS products used on networks that are publicly accessible via the Internet.

  • SanDisk InfiniFlash storage targets Big Data workloads

    06.03.2015

    SanDisk unveiled an all-flash storage platform that creates a new category for the IT industry, termed by IDC as Big Data Flash.

  • D-Link fixes critical router flaws

    03.03.2015

    D-Link has released new firmware for its DIR-820L Wi-Fi dual band cloud router, which fixes a number of security vulnerabilities.

  • 0-day flaw in Seagate NAS devices endangers thousands

    02.03.2015

    Seagate's Business Storage 2-Bay NAS line of products, which is popular both with home and business users, sports a zero-day remote code execution vulnerability that can be easily exploited by attackers, security researcher OJ Reeves warned on Sunday.

  • How safe are Android-based children’s tablets?

    25.02.2015

    Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the security of your child's data - as you should be - and about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children:Nabi 2iDeaPLAYKurio 7sSmartab 7”ProntoTec 7” WiMoContixo Kids 7”iRulu Kid Pad 7”Orbo Jr.Sprout Channel Cubby.The company tested the devices with their own Trustable app and a combination of three malware scanners.




Spotlight

Implementing an effective risk management framework

How do we balance the benefit of the free flow of information with the risk of inappropriate access and/or disclosure? What are the consequences of not doing so?


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Mar 26th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //