Blackberry vulnerability to be released soon



Between the Lines is warning that Blackberry Enterprise servers ought to be placed in the DMZ (if not already.) There is word that a critical vulnerability will be announced on August 14th. (And if we already know that’s coming then SOMEONE knows what that vulnerability is.) It basically uses software on the Blackberry (which could be received as an email attachment) to tunnel through to the Blackberry server and have remote access to the network. There are some suggestions from Research in Motion, but they may not be fully effective.

Related Posts

Blog Traffic Exchange Related Posts
  • SSH tips and tricks. This linux.com article will make a handy reference for anyone who's a bit fuzzy on what ssh can do other than just something that looks like telnet, although encrypted from end to end. It's from their CLI Magic series. Among the topics covered. Passwordless logins with ssh keys (walks through......
  • Firefox zero-day vulnerability (or is it?) I saw a comment somewhere else that zero-day was overused and in essense ANY previously unknown vulnerability in open source software is technically zero day... the intent here though is to use the word in this context.... "vulnerability has been released without giving the vendor an opportunity to patch..." Yes,......
  • Another critical IE vulnerability Say it ain't so.... yet another security vulnerability was discovered in Internet Explorer. Users are advised to use alternative browsers (firefox, opera, netscape.) At this point it doesn't look to be actively exploited, it can at least crash IE, but at worst allow a vulnerable system to be controlled remotely..........
Blog Traffic Exchange Related Websites
  • Internet Explorer 8 blocks a billion malware downloads James Pratt, Microsoft’s Product Manager stated in a blog post , “The SmartScreen team just informed me that we’ve reached an amazing milestone – Internet Explorer 8 has blocked 1 billion attempts to download malware!” The SmartScreen Filter evaluates URLs and their associated servers. If the software recognizes a server......
  • Most Popular and Useful Security Apps for a Smart Phone The following is a post from staff writer Crystal at Budgeting in the Fun Stuff, where she writes about finding the balance between paying your bills, saving for your future, and budgeting in the fun stuff along the way. Buying a smart phone is a major investment because you spend......
  • Morto Computer Worm Infecting Computers via Remote Desktop Protocol (RDP) A new worm called Morto has begun making the rounds on the Internet in the last couple of days, infecting machines via RDP (Remote Desktop Protocol). The worm is generating a large amount of outbound RDP traffic on networks that have infected machines, and Morto is capable of compromising both......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site