custom blog

Registration Forms

Every additional field in your form is losing you leads – so consider whether each question justifies the incremental loss in leads or opt-ins.   https://www.ventureharbour.com/form-design-best-practices/

By |2018-12-11T11:23:21+00:00June 25th, 2018|custom blog|

VLC Vulnerability – Tempered Subtitles can give complete control of the system remotely

Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution   Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities

By |2018-12-11T11:22:59+00:00June 25th, 2018|custom blog|

SambaCry Vulnerability – Remote Code Execution Vulnerability in Linux

A seven-year-old remote code execution vulnerability that is affecting Samba versions 3.5.0 and higher is making news this week. The vulnerability is billed as the WannaCry equivalent for *nix operating systems, and some are even calling it SambaCry since it affects the SMB protocol implementation and is potentially wormable – which can cause it to

By |2018-12-11T11:23:08+00:00June 25th, 2018|custom blog|

Chat - SplenGini

SplenGini is Typing...