Monthly Archives: May 2012

Malware Installed On Travelers’ Laptops Through Software Updates On Hotel Internet Connections


May 8, 2012 By
The Vigilant Application Owner

May 8, Internet Crime Complaint Center – (International) Malware installed on travelers’ laptops through software updates on hotel Internet connections. Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while establishing an Internet connection in their hotel rooms, the Internet Crime Complaint Center reported […]

Continue reading...

Categories: Uncategorized

Node.js Update Fixes Information Disclosure Vulnerability


By
The Vigilant Application Owner

May 8, H Security – (International) Node.js update fixes information disclosure vulnerability. The Node.js developers are advising all users to upgrade to the latest stable release of their JavaScript-based, event-driven, application framework as soon as possible. Version 0.6.17 of Node.js closes a security hole in Node’s HTTP implementation that could be exploited by a remote […]

Continue reading...

Categories: Uncategorized

iOS 5.1.1 Closes iPhone Holes


By
The Vigilant Application Owner

May 8, H Security – (International) iOS 5.1.1 closes iPhone holes. Apple released an iOS 5.1.1 update that closes four security holes in the iPhone and iPad operating system. Among the flaws is a WebKit problem that could allow a maliciously crafted Web site to crash applications or execute arbitrary code to take control of […]

Continue reading...

Categories: Uncategorized

Attackers Target Unpatched PHP Bug Allowing Malicious Code Execution


May 7, 2012 By
The Vigilant Application Owner

May 7, Ars Technica – (International) Attackers target unpatched PHP bug allowing malicious code execution. A huge number of Web sites are endangered by an unpatched vulnerability in the PHP scripting language that attackers are already trying to exploit to remotely take control of underlying servers, security researchers warned. The code-execution attacks threaten PHP Web […]

Continue reading...

Categories: Uncategorized

Selecting OSS Components: Three Questions Answered by Nexus Pro


By
Tim O'Brien

There are over 400,000 components in the Central repository including everything from servlet containers like Apache Tomcat to critical application infrastructure like Spring and Hibernate.    When you are designing an application or trying to update an application’s dependencies, how do you choose which component to use? Here’s an example of a decision you may […]

Continue reading...

Categories: Uncategorized

Nexus Stories From Across The Globe


By
Emily Blades

With nearly 19,000 active instances of Nexus around the world, we thought we would reach out and ask the community to share their Nexus stories and experiences with us. Over the last six weeks we held our Nexus Stories Contest and we were blown away by the tremendous response we received from around the globe. […]

Continue reading...

Categories: Uncategorized

Microsoft Detects New Malware Targeting Apple Computers


May 2, 2012 By
The Vigilant Application Owner

May 2, IDG News Service ­ (International) Microsoft detects new malware targeting Apple computers. Microsoft detected a new piece of malware targeting Apple OS X computers that exploits a vulnerability in the Office productivity suite patched nearly 3 years ago. The malware is not widespread, a researcher from Microsoft’s Malware Protection Center said. However, the […]

Continue reading...

Categories: Uncategorized