Category

Research

Logjam Security Vulnerability (CVE-2015-4000)

Following the continuous revealing of security vulnerabilities with the most unimaginable names such as “Shellshock” (CVE-2014-6271 and CVE-2014-7169), “POODLE” (CVE-2014-3566), “POODLE 2.0” (CVE-2014-8730) and “GHOST” (CVE-2015-0235) affecting SSL, TLS and other widely-used security protocols, it was just a matter of time until the curtain rolled revealing the latest security vulnerability this time affecting Diffie-Hellman algorithm for...
Read More

Cloud Services – Survey Results

How are Service Providers perceived in Lebanon? What does the market for Cloud Services look like? Data Consult conducted a survey during October 2014 in order to evaluate the Lebanese IT professionals’ perception of their Service Providers (ISPs, DSPs and Mobile Operators) and assess the market for Cloud Services. The survey was sent to 3,459...
Read More