The SANS Institute in cooperation with the FBI's National Infrastructure Protection Center just published its listing of the most common IT security exploits for Linux/Unix systems. Leading the pack: BIND (Berkeley Internet Name Domain) exploits, which succeed because administrators fail to upgrade BIND to more secure versions or are running the BIND daemon ("named"). Here are the most recent 10 Windows exploits...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment