Passwords continue to be the main way that we protect access to online services. Here are 5 tips that you can use to secure and manage your passwords.
MySQL Vulnerability Allows Attackers to Bypass Password Verification
CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks
The US Computer Emergency Response Team (US-CERT) has advised that some 64-bit operating systems and virtualization software running on Intel 64 CPU hardware are vulnerable to a local privilege escalation attack. An attacker may exploit the vulnerability to escalate privileges or gain access to the host machine from a guest virtual machine.