????????????(CWE-22)???
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。
今回は代表的なWebアプリケーション脆弱性であるディレクトリトラバーサルについて解説をしています。
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。
今回は代表的なWebアプリケーション脆弱性であるディレクトリトラバーサルについて解説をしています。
It only took Apple 24 hours to get 4 million pre-orders of the new iPhone 6, and scammers were right there with them to cash in. In the newest iteration of a scam used every time a new product is launched with fanfare, Facebook pages have been popping up claiming that people who like, share, […]
The latest news in the SSL and web browser industries is Google’s plans to deprecate SHA-1 in a unique way on upcoming releases of Chrome starting with version 39. Considerably different from Microsoft’s plans that were announced in November 2013, Google plans on placing visual marks or placing a block within the browser; all based on the version of the browser, date of use and certificate’s expiration date.
Here is what you need to know first:
What we expect to see with future Chrome releases:
Chrome 39 (Beta release: 26 September 2014, tentative production release: November 2014):

Chrome 40 (Beta release: 7 November 2014, tentative production release: post-holiday season):

Chrome 41 (Q1-Q2 2015):

Here is a matrix to help you understand the dates:
|
|
Sample Expiration Dates |
||||
|
Chrome Version (Beta dates) |
SHA-1 (Dec 31 2015) |
SHA-1 (Jan 1 – May 31 2016) |
SHA-1 (Jun 1 – Dec 31 2016) |
SHA-1 (Jan 1 2017 and beyond ) |
Recommended: SHA-2 |
|
Chrome 39 (Sept. 2014) |
|
|
|
|
|
|
Chrome 40 (Nov. 2014) |
|
|
|
|
|
|
Chrome 41 (Q1 2015) |
|
|
|
|
|
Moral of the story: Move to SHA-2, especially if your SSL certificate expires after December 2015.
What you need to do.
For more in-depth information, instructions, and assistance please refer to our knowledge center article on this subject. For a list of SHA-2 supported and unsupported applications review this list from the CA Security Council.
Read our SHA-2 webpage for the tools, steps to take, and a list of FAQs that can be generally applicable across all browsers.
Trend Micro Security 2015 supports multiple devices across all platforms to improve consumer security and privacy
Ability to scan and block malicious apps prior to installation on device provides users with superior security
The Tinba Trojan aka Tiny Banker targeted Czech bank customers this summer; now it’s gone global. After an analysis of a payload distributed by Rig Exploit kit, the AVAST Virus Lab identified a payload as Tinba Banker. This Trojan targets a large scope of banks like Bank of America, ING Direct, and HSBC. In […]
WebExpo is the largest Central European conference focused on topics related to the digital world. Among many topics, this year’s focus is security and big data. AVAST Software is not only a proud general sponsor of this event, but also an active participant. One weekend, over 1,400 online professionals, presentations, workshops, and lots of fun. WebExpo is […]
Apple Pay の登場によって POS システムのセキュリティが向上する可能性がありますが、攻撃者も新しい技術のセキュリティについて徹底的にテストすると考えられます。
In the wake of the Target, and now Home Depot, security breaches, Apple Pay wants to provide a safer way to make a purchase. Nestled in-between this week’s announcements of the iPhone 6 and the Apple Watch, Apple CEO Tim Cook announced a new mobile payment system called Apple Pay. New iPhone and Apple Watch […]
Apple está incursionando al mercado de los pagos. Recientemente, Apple dio a conocer dos nuevos modelos de iPhone, además del Apple Watch. Durante el anuncio Apple también presentó los detalles de Apple Pay, opción que permitirá a los usuarios realizar pagos usando la tecnología inalámbrica Near Field Communication (NFC).