A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
Home / admin (page 490)

admin

Microsoft Released Critical Security Update for Internet Explorer

Microsoft has released critical security update to address multiple vulnerabilities in Internet Explorer.  Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system if the users view a specially crafted webpage. Users and administrators are encouraged to review Microsoft Security Bulletins and apply the …

Read More »

Apple Releases Security Updates for OS X Server, iOS, Safari, and Yosemite

Apple has released a security updates for OS X Server, iOS, Safari, and Yosemite to address multiple vulnerabilities. Exploitation of one of these vulnerabilities may allow an attacker to take control of an affected system. The following updates are available: (a) iOS 8.4.1 for iPhone 4s and later, iPod touch …

Read More »

Mozilla Released Security Updates for Firefox, Firefox ESR and Firefox OS

The Mozilla Foundation has release security updates to address multiple vulnerabilities in Firefox, Firefox ESR and Firefox OS. These updates address vulnerabilities that could allow an attacker to take control of an affected system. The following updates are available: (a) Firefox 40 (b) Firefox ESR 38.2 (c) Firefox OS 2.2 …

Read More »

Microsoft Security Updates

Microsoft has released 14 security updates to address multiple vulnerabilities in Microsoft Windows.  Exploitation of these vulnerabilities could allow remote code execution or elevation of privileges and information disclosure. Users and administrators are encouraged to review Microsoft Security Bulletins and apply the necessary updates. Click here for more information

Read More »

Lenovo Service Engine (LSE) Bios Vulnerability

Lenovo Service Engine (LSE) Bios Vulnerability has been discovered in Lenovo personal computers and Desktops that could allow an attacker to take control of an affected system. Updates have been realised to address the vulnerability. Users and administrators are encouraged to review the Security advisory released by Lenovo and apply …

Read More »

Mozilla Security Updates for Firefox and Firefox ESR

The Mozilla Foundation has release security updates to address critical vulnerability in the built-in PDF reader for Firefox and Firefox ESR. The updates address vulnerability that could allow an attacker to read and steal sensitive local files from the victim’s computer. The following updates are available: (a) Firefox 39.0.3 (b) …

Read More »

WordPress Security Updates

WordPress 4.2.4 has been released to address critical cross-site scripting and SQL injection vulnerabilities. Exploitation of this vulnerability could allow a remote attacker to take control of an affected website. Users and administrators are encouraged to review the WordPress security and maintenance release and apply the necessary updates. Click here …

Read More »

WordPress Security Updates

WordPress 4.2.3 has been released to address critical cross-site scripting vulnerability. Exploitation of this vulnerability could allow a remote attacker to take control of an affected website. Users and administrators are encouraged to review the WordPress security and maintenance released and apply the necessary updates. For more information please visit: …

Read More »

Security Updates for BIND

The Internet Systems Consortium (ISC) has released security updates for BIND. These updates address vulnerability that could potentially allow an attacker to cause a denial of service condition. The following update is available:- (a) BIND 9-version 9.9.7-P2 (b) BIND 9-version 9.10.2-P3 Users and administrators are encouraged to review the ISC …

Read More »

Cisco Releases Security Updates

Cisco has released security advisory to address vulnerability in the Application Policy Infrastructure Controller (APIC), IOS software, Unified MeetingPlace Conferencing products. Exploitation of this vulnerability could allow an attacker to gain unauthorized access, cause a denial-of-service condition or take control of affected system. Users and administrators are encouraged to review …

Read More »