The Best iPad Cases for Kids: Keep Your Tablet (and Kid!) Safe and Sound

The Best iPad Cases for Kids: Keep Your Tablet (and Kid!) Safe and Sound

Whether you’re worried about your kid smashing their iPad on the ground or smashing their face on the iPad, there’s a case for you. Here’s our top picks for protecting the iPad from young kids.

It doesn’t matter if the iPad your child is using is a hand-me-down with years of wear and tear on it or a brand new iPad, you still want to keep the iPad safe from damage (and, in the process, keep your kiddos free from damage too). We’re not going to name any names here, but we’ve totally seen a kid or two do super smart things like watch Paw Patrol with the iPad held directly over their head at an arm’s length—a recipe for a busted nose if we’ve ever seen one.

So what should you look for when shopping for an iPad case for kids?

  • Thick Padding: The younger the child, the thicker the case you want. You might rarely if ever drop your iPad, but they’ll drop their iPad all the time. For young kids skip thin silicone cases and go right for the thick foam cases.
  • Large Handles: Again, the younger the kid, the larger you want the grip points on the case to be. Little hands lack dexterity and need big handles to grasp successfully.
  • Deep Bezel: The further the case sticks out from the surface of the screen, the better. This way when the iPad flops face down the screen is kept elevated off the surface of the table or floor.
  • Easy to Clean: Can you wipe peanut butter and jelly finger prints off the back easily with a baby wipe? No? It’s probably not a good case for younger kids then. Save the heavily textured cases for the big kids.

With that in mind we’ve picked out some great iPad cases for young kids that keep the iPad snug and safe in a protective cocoon.

The HDE Shock Proof Kids Case ($16)

Our editor-in-chief has multiple children under the age of 4, and this is the case that he uses to protect the iPads in their house — in fact, the picture above is directly from his living room. And after nearly 4 years of iPads at his house being dropped and thrown all day long every single day, this case has proven its worth.

The best thing about this case is that it can stand up for watching movies and videos, or it can lean at an angle to make it easier for kids to play their games while sitting at a table or just on the floor. The foam handle is a simple way for kids to carry it around the house, and it’s slim and light enough to make it easy for them to hold the tablet on their tiny laps.

The case is fairly snug, so you’ll want to get the right one for your iPad version — the same version works for for iPad Air 1, iPad Air 2, or the new 2017 iPad, but if you have an older iPad 2, 3, or 4, you’ll need a different one, and the iPad Mini requires yet another model.

The Speck iGuy ($14-28)

At this point we’ve seen several generations of toddlers use the Speck iGuy and we can say this if nothing else: the cute anthropomorphic case makes it nearly impossible for kids to murder an iPad.

The thick foam body is soft, fun to hold onto, easy to prop up, easy to wipe sticky finger prints off of, and even if your little tyke turns your iPad into a ninja-star projectile in the midst of a temper tantrum, there’s a good chance the iGuy will catch the brunt of the impact and your iPad will live to see another day. Although the feet-as-stand design isn’t perfect, it does a pretty good job helping kids prop up their iPad and the wide base stabilizes it when held on their laps.

It’s available in multiple colors and for different iPads. The original model fits the following full size iPad models: iPad 1, iPad 2, iPad 3, iPad 4 and the updated model fits the iPad Air, iPad Air 2, and iPad Pro. There’s even a mini iGuy, intended for the iPad Mini 1, 2, and 3.

The Snugg iPad Case ($25)

The Snugg iPad Case for kids is another great pick that echoes a lot of the design choices found in the iGuy: it’s brightly colored, wraps the iPad in thick foam, and offers a significant bezel to buffer the screen against scratches and damage.

The biggest difference between the two case designs is that the Snugg ditches the wide-bottom for a handles-all-around design that ensures your kids can keep a good firm grip on their iPad no matter what orientation they hold it in.

The Snugg is available in pink and blue and for smaller iPads (the Mini 1, 2, and 3) as well as some of the larger iPads (the iPad Air, Air 2, and Pro). Unfortunately Snugg doesn’t make a similar case the regular iPad body.

The HDE Shock Proof Kids Case with Screen Protector ($18)

If you’re looking for a case that includes integrated screen protection, this alternate line of iPad cases from HDE—the same case we recommended earlier—fit the bill nicely. Not only does the case have the same big beefy handle that also doubles as a kick stand for the iPad, but it features a touch-screen friendly snap-on screen protector that will project the iPad from everything short of a hammer-wielding toddler. The screen protector does make it a little more difficult to press the home button, but if you need the extra protection for the screen, it’s worth considering.

Because the cases are so custom fit to the iPad on account of the snap-on screen, there’s less wiggle room between models so be sure to buy the right one for your particular iPad. You can get the HDE cases for the iPad 2, 3 and 4, as well as the iPad Mini 1, 2, and 3, and the iPad Air 1 and iPad Air 2.

Have a tip or trick to help make the iPad more kid-friendly? Let’s hear about it in the comments below.

Security News

via How-To Geek

November 6, 2017 at 09:06AM

The Future of Cybersecurity Part II: The Need for Automation

The Future of Cybersecurity Part II: The Need for Automation

Part 1 of this 2-part series can be found here.

The growing complexity of today’s networks and the growing sophistication of today’s threats has outpaced the ability of most traditional security devices to keep up. Until now, the approach of far too many IT teams has been to simply throw more money at the problem by adding yet another device into their security wiring closet. Billions have been spent on this approach every year for decades, and we really don’t have much to show for it. If cybersecurity is an arms race, the good guys aren’t winning.

Instead, security professionals can take a handful of simple, basic steps to better protect their networks.

First, it’s worth noting that 90 percent of all organization face attacks on application vulnerabilities that are at least three years old. 60 percent of these attacks target vulnerabilities that are ten years old. And they continue to be successful – so much so that we have seen cybercriminals switch development resources from new ways to break into networks to more sophisticated tools to use once they get inside. Because for many of these attackers, the assumption is that they are going to get in.

Part of the reason is that many organizations are reluctant to patch old vulnerabilities or replace outdated devices because they fear breaking critical services and processes they depend on. And in today’s digital economy, where data is money, being offline for even a short time can drive consumers to look elsewhere for the services they demand. And because networks are evolving so rapidly, many organizations have simply lost track of the devices in their network.

If a device is too critical to take offline, then network segmentation has to be in place so that if a device is compromised its impact is restricted to a small segment of the network. Next, redundancies need to be built so that traffic can flow around it while it is being updated. And automated inventory controls need to be in place to identify and list all of the exposed devices in your network. But the fact is that patching can no longer be ignored. You might as well put out a welcome mat and a digital arrow saying, “valuable data this way.”

Another problem is that not only do attacks often manage to hide inside networks for months before detonating, but the really good ones learn what normal behavior looks like in the network so that when they do detonate they are able to mimic network traffic in order to avoid detection. One of the keys to addressing this sort of sophistication moving forward is a marriage of threat intelligence and detection. Businesses need advanced threat intelligence – products like security information and event management (SIEM) tools that can collect and correlate traffic from a variety of devices collected from across the network to identify and deal with advanced threats. Even the best malware has to eventually either modify rules or extract large volumes of data. And that can be detected. It just sometimes requires aggregating and tracking threat intelligence to discover and investigate anomalies.

More and more, a critical component to a robust defense is automation. Cybercriminals are increasingly developing and deploying automated attacks in order to scale attacks more effectively and to reduce the amount of direct hand holding that many traditional attacks require. To effectively compete against this sort of strategy, we need to fight automation with automation.

Threats are evolving so quickly on the black hat side that the only way to combat them is through automated and intelligent defense layers that can quickly identify new and existing threats and then make decisions to mitigate them. I call this type of cybersecurity defense “actionable intelligence.” It requires deploying interconnected security solutions everywhere across your expanded network, including deep into the cloud, The goal is to create a security solution that is able to see and identify the stages of a threat and then make a decision on its own. Such an expert system is able to identify and block attacks at network speeds so that we don’t have to rely on humans, who often miss too much and respond far too slowly, to take action.

This may require rethinking – and even retooling – your security infrastructure. To start, devices need to be able to see each other and share threat intelligence. This means that isolated security devices and platforms will need to be replaced with tools that use common operating systems or management consoles, and that are built around open standards, so they can become an integral part of an integrated and intelligent security fabric.

This intelligence needs to be correlated and processed in order to detect highly distributed attacks that might otherwise go undetected. This requires combining traditional security tools such as firewalls, intrusion prevention systems, and secure gateways for email and web traffic with advanced threat prevention tools such as sandboxes in order to detect advanced and previously unseen threats.

Once a threat has been discovered, that intelligence needs to be converted into actionable rules and policies that can be automatically be distributed back across the network to drive a coordinated response. Firewall rules and IPS signatures need to be updated. Secure gateways and endpoint clients need to be hardened. Rogue and infected devices need to be identified, and network segmentation needs to dynamically isolate all compromised devices to stop the spread of infection. Forensic analysis needs to be launched to detect the point of compromise and seal that breach. And remediation needs to begin so that quarantined devices can be brought back online as soon as possible.

And all of this needs to happen automatically, everywhere and at the same time across the entire distributed network. This includes physical and virtual environments, distributed data centers, remote offices, IoT and mobile endpoint devices, and even deep into the multi-cloud, including everything from complex infrastructure solutions to simple cloud-based services.

Actionable intelligence combined with expert systems empowered with automated processes that enable autonomous decision-making is the future of cybersecurity. Organizations that adopt and transition to such an approach will thrive during our society’s digital transformation. The majority of those who don’t make these changes aren’t likely to survive. It’s really as simple as that.

Sign up for our weekly FortiGuard intel briefs or to be a part of our open beta of Fortinet’s FortiGuard Threat Intelligence Service.

Original article published in CSO and can be found here.

Security News

via Fortinet Blog | Latest Posts

November 6, 2017 at 09:05AM

The Future of Cybersecurity Part I: The Problem of Complexity

The Future of Cybersecurity Part I: The Problem of Complexity

It seems like CSOs are always seeing flashing red lights on their security dashboards these days, warning them of another breach or risk of compromise. There are so many security events happening day in and day out that it’s difficult to decide what’s the top priority. That’s a good metaphor for the state of cybersecurity efforts across the globe – we’re in a constant state of flashing red.

That is, if we even see the attack coming, which we increasingly don’t. Recent breach disclosures, once again, show that not only do defenses get bypassed, but malware is also often able to sit inside a compromised network undetected for months collecting and exfiltrating massive amounts of data.

Hardly a week goes by without the announcement of some major breach. It’s gotten so that many attacks don’t even get reported any more unless they are especially spectacular. Did you hear about the recent Taiwanese bank compromise that resulted in US$60 million being stolen? No? Because not too long ago, that sort of thing would have made global news. But not now. The new normal in cybersecurity is that there is no more normal, unless you count that we are getting used to hearing bad news.

Part of the reason for this escalation in cybercrime is that the possible attack landscape is constantly expanding. As an example, as organizations have begun to embrace the Internet of Things, related threats targeting IoT have rapidly evolved. Just one year ago, about 2 percent of global attacks were targeted at mobile devices. Today, that number is close to 10 percent.

IoT has become the next big target for hackers. They are targeting CCTV cameras, IP-based security cameras, DVRs, consumer-grade routers, and printers. These devices are all connected wirelessly to the Internet, creating what we now call IoT. To keep costs low, or simply because manufacturers have not been very careful, consumer grade devices have simply not been developed with appropriate security in place.

Because of their convenience, many of these devices are migrating from homes to small businesses and even inside large corporate networks. Even commercial grade IoT devices, such as monitors or inventory controls are poorly secured and susceptible to compromise. The prevalence of these highly interconnected devices have increased the attack surface exponentially, and as a result, over the past year we have seen millions of compromised IoT devices aggregated by attackers and used to take out individual organizations or even huge chunks of the Internet. And because of the nature of these devices, many can’t even be patched or updated when vulnerabilities are discovered.

IoT is just a part of the problem. In many ways, it’s an extension of a critical BYOD challenge that began a few years ago, and in many organizations hasn’t been fully addressed from a security standpoint. In addition, many organizations are asking their CSOs and security IT teams to navigate a whole range of new technologies, including SDN, the migration to the cloud and several X-as-a-service delivery models. New architectures built using isolated multi-cloud services, for example, often have restricted visibility, complicated management systems, and no way to implement any sort of centralized orchestration or control over security policies or posture. And at the same time, all of these new technologies are creating new avenues of attack.

The other part of the problem is that cybercriminals are just getting better at what they do. When I’m asked about the current state of security when I meet with customers and global public organizations, I say that we’re not only seeing the volume of attacks increasing, but that level of sophistication is increasing at an even faster rate. Hackers are innovative and highly motivated, with sophisticated networks of developers and tools available on the dark web available at their fingertips. As a result, they are building automated and clever techniques into these attacks, including self-learning technologies that allow them to discover and exploit a wide range of vulnerabilities on their own.

All of this sounds like very bad news. And of course, it is. But I’m not trying to create a sense of panic in businesses and other organizations. There is something that can be done about all this, but it is going to require that we think about this problem in a very different way. Isolated security devices and platforms guarding specific network access points may have been enough a decade ago (though that could be debated), but security tools today need to be able to work together as an integrated system designed to span and adapt to the network as it shifts and evolves. In the Part II we’ll talk about how to make that happen.

Sign up for our weekly FortiGuard intel briefs or to be a part of our open beta of Fortinet’s FortiGuard Threat Intelligence Service.

Security News

via Fortinet Blog | Latest Posts

November 6, 2017 at 09:05AM

The Myth of Security Enabling Your Business

The Myth of Security Enabling Your Business

IT Security Myths

Organizations That Do Not Invest Even in Baseline Security Are Realistically Uncompetitive

Every year there are reports and surveys which make the case that security inhibits innovation, productivity and generally holds businesses back. I am not going to argue with that sentiment. Security requires that things are done in a certain manner, which can act as a constraint on wanting to do things a different way. What I do want to address is the notion that this is the case because security people just don’t get business. It’s actually the reverse – businesses do not get security. And this misconception is based on several fallacies, false beliefs and myths. 

Security as an add-on cost

The first myth is that security is an add-on cost. It is not. Security is, instead, an inherent cost of using digital technologies. Any realistic calculation can only be done by weighing the two against each other – the gains of using digital technologies minus the cost of securing them. Only when that sum turns negative can it be considered an overhead. Digital Technology has granted huge gains and enabled the world to manage complexities that would be impossible to deal with any other way.

This argument is like claiming that minimizing the chances that an airplane will crash is an unnecessary cost. Planes are metal tubes powered by mechanical engines that fly hundreds of miles up in the air. Crashing is an inherent risk of flying. But the benefit of an airplane is that it can get us safely to a destination in a much shorter time than taking a ship, driving or walking.

If every third plane crashed, people would find an alternative method. It would not be an appealing everyday mode of transport. There is always a slight probability that a given plane can crash – but that probability is negligible (According to statistics, flying is in fact far safer than driving). The productivity gains and time savings, on the other hand, are immediately discernible, as anyone who has ever sailed from Europe to the US can attest. 

Security can be bolted on after the fact

The second myth is that security can be bolted on after the fact. It cannot. Security must be included from the beginning, or it can rarely be effective. Design decisions made without consideration for security can make good security challenging to impossible.

As an example, despite decades of bad experiences and lessons learned from prior technology generations such as Mainframes and the Internet, best practices are regularly ignored when new technologies are introduced. From one technology evolution to the next, the expectation that security will be bolted on afterwards persists. IoT is the latest example of this axiom, where manufacturers rushing to market are oblivious to good security practices, with predictable consequences. Compared to the perception that security inhibits productivity and innovation, the reality is bad security has a far greater negative impact. There’s no greater inhibitor to innovation than a lack of trust in a technology because it has been badly secured.

Making Security Easy

The greatest myth of all is that security people should make security easy. Good security isn’t easy, and many of the challenges and problems it must address do not actually derive from the security field.

This is like blaming a doctor for the fact that human bodies are frail. Similarly, since we know smoking increases our chances of getting lung cancer, we can’t smoke and then blame the doctor for not being able to cure the cancer. Security people don’t intentionally complicate business processes, instead it is often a by-product of providing good security. They also would prefer if it was easy.

There are discussions around enabling the business with security, which are of course ludicrous. Security enables a business to be secure and nothing else. This may provide a competitive advantage in some cases, but in general it has a very different basis. People don’t try to avoid sickness, injury and stay alive for a competitive advantage, they stay alive because the alternative is to be dead. 

The alternative to good security is being breached – with all of the associated consequences: losing credibility, trust, intellectual property, money and not fulfilling regulatory compliance. Not being the victim of these things already enables the business.

Organizations that can’t afford even baseline security, which includes patching, are realistically uncompetitive. Until recently this has been ignored, businesses have gotten away lightly, but we already seeing this change. Ask some of the former executives of Equifax if they would push the security team to prioritize Innovation and Productivity over Security again. 

It is easy to believe you are flying when you are actually falling, just because you haven’t hit the ground yet.

Oliver Rochford is the Vice President of Security Evangelism at


. Oliver is a recognized expert on threat and vulnerability management as well as cyber security monitoring and operations management. He previously worked as research director at Gartner. He has worked as a security practitioner and white hat hacker for Tenable Network Security®, HP Enterprise Security Services, Verizon Business, Secunia® (now Flexera Software), Qualys®, and Integralis (now part of NTT Com Security).

Previous Columns by Oliver Rochford:


Security News

via SecurityWeek RSS Feed

November 6, 2017 at 08:56AM

Remote Monitoring and Control (IoT) Provider Acorn to Release Q3’17 Results and Host Investor Call on Tuesday …

Remote Monitoring and Control (IoT) Provider Acorn to Release Q3’17 Results and Host Investor Call on Tuesday …

WILMINGTON, Del., Nov. 06, 2017 (GLOBE NEWSWIRE) — Acorn Energy, Inc. (OTCQB:ACFN), a provider of machine-to-machine, Internet of Things (IoT) remote monitoring and control systems and services, will host a conference call to review its third quarter 2017 financial results, business progress and outlook on Tuesday, November 14, 2017 at 4:30 p.m. ET. Results will be issued after the market close on the same day.

Participating on the call will be Jan Loeb, President and CEO, Michael Barth, CFO and Walter Czarnecki, President and CEO of OmniMetrix.  

Conference Call Details:

Date/Time: Tuesday, November 14th at 4:30 pm ET
Dial-in Number:  844-834-0644 or 412-317-5190 International
Online Replay/Transcript:   Audio file and call transcript will be posted to the
  Investor section of Acorn’s website when available.

About Acorn Energy, Inc. ( 
Acorn Energy, Inc. is a holding company with investments in two portfolio companies:

OmniMetrix™, Inc. ( – is a leader and pioneer in machine-to-machine (M2M) wireless remote monitoring and control or the Internet of Things (IoT) for stand-by generators, gas pipelines, cell towers, medical facilities, data centers, public transportation systems, and other critical equipment, including at federal, state and municipal government facilities. OmniMetrix is a proven solution for making critical systems more reliable with thousands of monitored assets and many Fortune 500 customers. Acorn has an 80% equity stake in OmniMetrix and consolidates its assets and results of operations.

DSIT Solutions Ltd. ( – develops and produces sonar applications for defense, HLS, energy and commercial markets. DSIT employs a world-class multi-disciplinary professional team skilled in the latest sonar and real-time technologies. Products include: The Shield family of Diver Detection Sonars, Anti-Submarine Warfare and Hull Mounted Sonar systems, Portable Acoustic Ranges, Underwater Acoustic Signal Analysis applications and sonar simulators and trainers. Acorn has a 41.2% equity stake in DSIT that it accounts for under the equity method.

Safe Harbor Statement
This press release includes forward-looking statements, which are subject to risks and uncertainties. There is no assurance that Acorn will be successful in growing its business; reaching profitability; or maximizing the value of its operating companies and other assets. A complete discussion of the risks and uncertainties, which may affect Acorn Energy’s business, including the businesses of its subsidiaries is included in “Risk Factors” in the Company’s most recent Annual Report on Form 10-K as filed by the Company with the Securities and Exchange Commission.

Twitter: @Acorn_IR

Investor Relations Contacts:

William Jones, 267-987-2082
David Collins, 212-924-9800
Catalyst IR 

Security News,IoT News

via IoT – Google News

November 6, 2017 at 08:54AM

The Internet of Things holds great promise but also massive threats

The Internet of Things holds great promise but also massive threats

November 6, 2017 • Internet of Things, Top Stories

The Internet of Things holds great promise but also massive threats

The Internet of Things holds great promise but also massive threats

While the Internet of Things (IoT) held great promise for a utopian future in which everything was connected to everything else, there were also huge security risks.

“Despite the very best efforts by IT security experts in academia and industry, manufacturers continue to bring devices with huge security flaws to market.

“At the same time, consumers are criminally negligent by not changing the passwords of new devices and making it dead-easy for hackers to penetrate their networks,” said Professor SH (Basie) von Solms, Director of the Centre for Cyber Security in the Academy for Computer Science and Software Engineering at the University of Johannesburg.

He said the risk was increasing exponentially as more IoT devices were flooding the market and being hooked up to the internet.

“Ranging from video surveillance cameras that connect directly to the Internet to vital life-supporting medical devices such as ventilators and heart monitors in hospitals, a large proportion of these gadgets can be hacked by intruders with even minimal skills in a matter of minutes.

“There are numerous examples worldwide of whole networks that have been brought to their knees as a result of internet-connected devices that had been hijacked and infected with malicious software (malware).” Von Solms said.

Recently when the chief security officer for the largest health provider in New Jersey in the United States launched an investigation to test the health of his IT network, instead of finding just the 30 000 computers he knew were connected across the company’s 13 hospitals, he discovered that more than 70 000 devices had been hooked up.

This included thousands of IoT devices such as ventilators, heart monitors, electrocardiograph machines and many other mission-critical machines he did not know about.

It also included tens of thousands of cell phones connected via a wireless network that connected the 13 hospitals in the group.

There are many hugely positive aspects to the internet of things that not only improved the lives of people using these devices but also held the promise of promoting rapid economic growth.

One company that has entered the commercialisation of IoT in a big way is Centurion-based Moyo Business Advisory MBA, a specialist business consultancy and big-data analytics house.

Dewald Lindeque, business development director at MBA said they had a substantial number of projects both commissioned and in the pipeline that had a massive economic impact on the sites where they had been implemented.

“The internet of things is basically about collecting large amounts of data from sensors that are used by industry to monitor a myriad of manufacturing and industrial processes”.

“The mining industry in South Africa has embraced the IoT in a big way using it to monitor equipment, prevent failures, optimise production and even prevent injury or death.

The sensors or devices are not what the hype is all about, it is what can be done with the data it collects, that adds tremendous value.

“At a time when the economy in general and mines, in particular, are having a hard time financially, cutting costs is essential,” Lindeque said.

From a security point of view, it is essential to incorporate controls and prevention methods at a micro level. Each functional unit should have, amongst other things, security features incorporated into its design.

Edited By: Darryl Linington
Follow @DarrylLinington on Twitter
Follow on Twitter


Security News,IoT News

via IoT – Google News

November 6, 2017 at 08:54AM

Überzeugen in Verkaufsgesprächen und im Sales Pitch

Überzeugen in Verkaufsgesprächen und im Sales Pitch

Seminar bei der NMG Akademie

Überzeugen in Verkaufsgesprächen und im Sales Pitch

Die Neue Mediengesellschaft Ulm (NMG), zu der auch die com! professional gehört, startet mit der NMG Akademie einen eigenen Anbieter für Fort- und Weiterbildung. Ein Seminar im November: Verkaufsrhetorik: Überzeugen in Verkaufsgesprächen und im Sales Pitch.

Security News

via com! professional

November 6, 2017 at 08:51AM

Vuln: Splunk Multiple Local Privilege Escalation Vulnerabilities

Vuln: Splunk Multiple Local Privilege Escalation Vulnerabilities

Splunk Multiple Local Privilege Escalation Vulnerabilities

Bugtraq ID: 101664
Class: Input Validation Error
Remote: No
Local: Yes
Published: Oct 27 2017 12:00AM
Updated: Oct 27 2017 12:00AM
Credit: Hank Leininger of KoreLogic, Inc.

Splunk Splunk Universal Forwarder 0

Splunk Splunk Light 0

Splunk Splunk Enterprise 6.6.3

Splunk Splunk Enterprise 6.6.2

Splunk Splunk Enterprise 6.6.1

Splunk Splunk Enterprise 6.6

Not Vulnerable:

Security News

via SecurityFocus Vulnerabilities

November 6, 2017 at 08:44AM

Vuln: Ayukov NFTPD CVE-2017-15222 Stack Buffer Overflow Vulnerability

Vuln: Ayukov NFTPD CVE-2017-15222 Stack Buffer Overflow Vulnerability

Ayukov NFTPD CVE-2017-15222 Stack Buffer Overflow Vulnerability

Bugtraq ID: 101602
Class: Boundary Condition Error


Remote: Yes
Local: No
Published: Oct 21 2017 12:00AM
Updated: Nov 06 2017 01:05PM
Credit: Berk Cem Göksel

Ayukov NFTPD 2.0

Ayukov NFTPD 1.8

Ayukov NFTPD 1.72

Ayukov NFTPD 1.71

Not Vulnerable:

Security News

via SecurityFocus Vulnerabilities

November 6, 2017 at 08:44AM