The Epocrates Mobile Trends Report was released in May 2014 and it offers some very interesting perspectives on adoption of digital technology among clinicians. ..... Read More
On January 27th 2015 the GHOST vulnerability was revealed to the public and has been assigned CVE-2015-0235 (Common Vulnerabilities and Exposures). The vulnerability is a buffer overflow bug in the glibc’s GetHost function. This is why it is called as the GHOST vulnerability. ..... Read More
A problem was discovered with the encryption technology used to securely transmit e-mail, social media posts, e-commerce transactions and other related Web traffic. This flaw is known as the ‘Heartbleed’flaw and has remained undetected for nearly 2 years. ..... Read More
Google’s Security team discovered a serious vulnerability in SSL 3.0 that can be exploited to steal certain confidential information, such as cookies. This vulnerability is known as POODLE (Padding Oracle On Downgraded Legacy Encryption). ..... Read More
Shellshock is a security bug in Bash (Bourne Again SHell) command-line interpreter, mostly known as shell.Shellshock allows attackers to gain unauthorized access to computer system by executing arbitrary commands ..... Read More