Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 154 Next »

12%
Viewing a JPEG File May Compromise iOS Devices
26.10.2016
Home »  News  » 
 
to audio even after the call is terminated. Another bug that was fixed allows applications to obtain access to contacts even if access is revoked. Another notorious problem was fixed in WebKit that lead
12%
macOS Under Attack
15.02.2017
Home »  News  » 
 
to an infected host. This is the second macOS infection in the same week. Earlier researchers at Iran Threat found a macOS agent called MacDownloader that targeted the defense industrial base and a human rights
12%
Hackers Threaten to Wipe More Than 300 Million Apple Devices Remotely
29.03.2017
Home »  News  » 
 
A group of hackers that call themselves the “Turkish Crime Family” claim that they have access to more than 300 million accounts of Apple users, including @icloud and @me domains. The group
12%
SELinux Systems Vulnerable to sudo Vulnerability
06.06.2017
Home »  News  » 
 
on the filesystem (including root-owned files) with his command's output, because relabel_tty() (in src/selinux.c ) calls open(O_RDWR|O_NONBLOCK) on his tty and dup2() s it to the command's stdin, stdout
12%
Serious Stack Clash Bug Affects Linux Systems
20.06.2017
Home »  News  » 
 
problem, it has been around for more than a decade now and was exploited earlier in 2005 and 2010. Linux fixed the issue by adding a protection called stack guard-page after the 2010 exploit. “Access
12%
Security Flaws Found in UPnP
31.01.2013
Home »  News  » 
 
, companies, and ISPs to take immediate action in identifying and disabling any Internet-exposed UPnP endpoints in their environments. Rapid7 has released a free tool called ScanNow UPnP to help identify those
12%
Canonical Announces Mir Display Server
11.03.2013
Home »  News  » 
 
Canonical has announced development of a new open source display server called Mir. This server is intended as "a replacement for the X Window server system to unlock next-generation user
12%
FDA Recalls Nearly Half a Million Pacemakers Over Security Concerns
11.09.2017
Home »  News  » 
 
The Food and Drug Administration has issued a warning calling for a voluntary recall of more than 465,000 pacemakers implanted in patients. In a review, the FDA found potential vulnerabilities
12%
AI Bluetooth Attack
21.11.2017
Home »  News  » 
 
In September, Armis Labs disclosed a new attack vector called BlueBorne that affects Bluetooth devices. Every desktop, IoT, and mobile platform, including Android, iOS, Linux, and Windows
12%
Jump Announces New Research Centers
23.01.2018
Home »  HPC  »  News  » 
 
integration of processors and memory, which could lead to better performance by breaking down the so-called “memory wall” that has increasingly become a bottleneck for high-end computer systems. See

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice