GitLab repairs critical flaw that lets users log in as admins

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

May 10, 2016
Featured Image

You too? Who's on the hacker hit list

You don't need to carry the keys to the enterprise network to have a malicious hacker tail you. Here's who's at risk and what to do about it Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

GitLab repairs critical flaw that lets users log in as admins
Why most Android devices won't patch the Qualcomm bug
Where to cut corners when the security budget gets tight
Attackers are probing and exploiting ImageTragick flaws

White Paper: Blue Coat Systems

Innovation for the Cloud Generation

Did you know that 1 in 10 cloud-based files contain regulated data, including PII, PCI, PHI and source code? This Blue Coat guide helps you identify and address the unexpected risks of the "cloud generation." Read More

Thumbnail Image

GitLab repairs critical flaw that lets users log in as admins

The fixes are available for all supported versions of GitLab Community Edition and GitLab Enterprise Edition Read More

Thumbnail Image

Why most Android devices won't patch the Qualcomm bug

Qualcomm has patched a high-severity flaw, but handset manufacturers' reluctance to update older models means most of them will remain vulnerable Read More

Thumbnail Image
INSIDER

Where to cut corners when the security budget gets tight

Security pros provide advice on where to focus your efforts when money is unexpectedly short on supply Read More

Thumbnail Image

Attackers are probing and exploiting ImageTragick flaws

Security companies have observed attacks trying to exploit recently disclosed remote code execution flaws in the ImageMagick Web server library Read More

eBook: Kaspersky Lab Inc

Lifting The Veil Of Security On Cybercriminals

With all of the overwhelming statistics on cybercrime, it can be easy to forget that there are actual people behind these facts and figures. Have you ever wondered who they are? What countries they come from? Who are their top targets? Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.