A large number of terminal servers, which are also called serial port servers and are used to provide remote access to non-networked equipment such as point-of-sale systems and environmental controls, are at risk of becoming the targets of vulnerability exploits. Rapid7 researcher HD Moore recently presented a study and published an accompanying blog post showing that more than 114,000 serial port servers are accessible over the internet, with a significant share offering administrative access to connected systemsRead More »
A recently discovered flaw in version 6.1 of Apple's iOS software allows a malicious user to bypass the lock screen on a password-protected iPhone and use many of the device's featuresRead More »
Software errors are generally considered a loss for all parties involved - users lose functionality, vendors lose revenue, etc. - but a recent glitch allowed Minneapolis drivers to enjoy more than a day of free downtown parkingRead More »
A NASA research mission testing automated satellite refueling and repair was delayed following an error in the software controlling the International Space Station's (ISS) robotic armRead More »
Homeowners and businesses expect to improve safety by installing surveillance cameras, but a recently discovered flaw in many brands of security camera digital video recorders (DVRs) allows attackers to turn the tablesRead More »
More than 1,500 vendors and 6,900 products encompassing millions of end user systems have been identified as vulnerable to one or more security flaws in the Universal Plug and Play (UPnP) protocol, according to a recently released study by security firm RapidRead More »
A popular print server software used by many manufacturers is vulnerable to attacks that can bypass authentication processes, change data recording printer use and cause hardware to crashRead More »
The rise of "smart" devices equipped with arrays of sensors and network connections is rapidly making the "Internet of Things" one of the most widely hyped ideas of the year aheadRead More »
A flaw in the firmware coding of many voice over internet protocol (VoIP) phones could allow hackers to remotely install malware and eavesdrop on private conversations, according to researchers from Columbia University in New York.Read More »
The embedded software in products ranging from SCADA systems to medical devices to vehicles such as military drones is subject to a "pervasive vulnerability" making them insecure, according to a head Pentagon researcherRead More »
Now that you have Grafana and Prometheus connected - let's make some really strong and visually appealing dashboards...
How we can use technologies like Kubernetes to build an application ecosystem where the remnants of monoliths can still cost-effectively serve the business...
In order to take full advantage of Prometheus, and its visualization counterpart Grafana, we’ll start with gathering metrics that aren’t generated within a...
© 2019 Rogue Wave Software, Inc. All rights reserved.
Rogue Wave is a registered trademark of Rogue Wave Software, Inc. Other product and service names may be trademarks of Rogue Wave Software, Inc. or its affiliates.