The Shellshock Q&A

What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]

Read More…

The Shellshock Q&A

What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]

Read More…

Has the 5 million Gmail password hack affected you?

On Wednesday, many technology websites and blogs broke the news that hackers leaked around 5 million stolen Gmail account details to a Russian Bitcoin forum. This follows similar leaks of account data from popular Russian web services, so is there room to be concerned? Understandably, this has caused huge outrage and worry amongst users of […]

Read More…

Kuppinger Cole Review

Kuppinger Cole recently reviewed Nervepoint Access Manager Self Service as part of their vendor snapshot series. The complete report can be downloaded for free from their site here. Kuppinger Cole is a leading analyst company for identity focused information security providing vendor-neutral analysis, reporting and consultancy across the various information security segments from Identity Access […]

Read More…