Saturday, December 31, 2011

Google Alert - vulnerabilities

News4 new results for vulnerabilities
 
Computer Vulnerabilities Exploited in Microsoft at All-Time Low
Infoboom
Computer vulnerabilities in Microsoft software are at an all-time low. The number of vulnerabilities exploited by attackers was down to 10.8 percent in 2011. In 2010, that number was closer to 15 percent according to IBM. Even the vulnerabilities that ...
See all stories on this topic »
Researcher Warns of Vulnerabilities in Train Switching Systems
eSecurity Planet
At the Chaos Communication Congress in Berlin, Professor Stefan Katzenbeisser recently warned that hackers could use DDoS attacks to shut down train switching systems. "'Trains could not crash, but service could be disrupted for quite some time,' ...
See all stories on this topic »
Exploit Theater : MS11-083 and Defense-in-Depth
SYS-CON Media (press release) (blog)
This exploit just illustrates that a lot of our vulnerabilities come from not implementing a defense-in-depth that arcs from our end users to our servers. Network segmentation, policy, DMZ, firewalls, intrusion prevention/detection, endpoint protection ...
See all stories on this topic »
Centralizing Web Application Security
GovInfoSecurity.com
Credit Eligible When the Commonwealth of Pennsylvania suffered a major security breach a few years back, vulnerabilities in a web application were to blame. To prevent such a problem in the future, the state developed a centralized certification and ...
See all stories on this topic »

GovInfoSecurity.com


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.

Friday, December 30, 2011

Google Alert - vulnerabilities

News6 new results for vulnerabilities
 
Microsoft fixes .NET security holes
ZDNet UK (blog)
The MS11-100 security update, released on Thursday, is rated Critical for a Denial of Service (DoS) vulnerability. "This security update resolves one publicly disclosed vulnerability and three privately reported vulnerabilities in Microsoft . ...
See all stories on this topic »
Stuxnet, Duqu Date Back To 2007, Researcher Says
InformationWeek
Both viruses attack Microsoft Windows systems using a zero-day vulnerability, which tries to exploit application vulnerabilities that haven't been discovered yet. Superworms like Stuxnet and Duqu--which seem to have been created to target the critical ...
See all stories on this topic »
GSM Phones Vulnerable To Hijacking, GSMA Unconcerned
Mobile Magazine
In any case, "the industry" he mentions may want to look at the real life demos of claimed vulnerabilities and subsequent exploits of these, first. Reuters claims that only a few flaws have been found in the GSM technology itself (which stands for ...
See all stories on this topic »

Mobile Magazine
WebsiteHowtoMake.com Shares the List of 10 Security Tips for Webmasters
San Francisco Chronicle (press release)
In our modern world when most security vulnerabilities have already been fixed on the programming language core level, database engine, and web server software levels, hacker attacks are still taking place. Many beginner webmasters wonder if there is a ...
See all stories on this topic »
Disable WPS in WiFi routers -- if that's possible in your device, experts say
Dark Reading
Security researcher Stefan Viehbock this week published a white paper exposing vulnerabilities in the WiFi Protected Setup (WPS) protocol that lets an attacker grab WPA/WPA2 passwords in just a few hours. WPS contains a design flaw that allows an ...
See all stories on this topic »
Colts at Jaguars: How they match up
Indianapolis Star
There are vulnerabilities to attack, and Orlovsky has demonstrated the competence to exploit them. The Colts have asked quiet efficiency of Orlovsky during their two-game winning streak and he has delivered: 34-of-58 (58.6 percent), 326 yards and two ...
See all stories on this topic »


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.

Thursday, December 29, 2011

Google Alert - vulnerabilities

News7 new results for vulnerabilities
 
GSM mobile phone network: Expert shows vulnerability in mobile communications ...
San Francisco Luxury News
class="firstLetter"> H andys being targeted by hackers: A newly discovered vulnerability in the GSM mobile communications standard allows attackers, according to an expert to take over control of mobile phones. You could Sun send premium SMS or call ...
See all stories on this topic »
Wi-Fi Protected Setup Flaws Make Wireless Network Brute-force Attacks Feasible
PCWorld
The vulnerabilities identified by security researcher Stefan Viehbock affect a large number of WPS-enabled routers and wireless access points. The WPS standard was created in 2007 by the Wi-Fi Alliance in order to provide non-technical users with a ...
See all stories on this topic »
SCADA and PLC vulnerabilities in correctional facilities
Help Net Security
Using original and publicly available exploits along with evaluating vulnerabilities in electronic and physical security designs, researchers discovered significant vulnerabilities in PLCs used in correctional facilities by being able to remotely flip ...
See all stories on this topic »
COMMENT: The changing face of cyber terrorism —Musa Khan Jalalzai
Pakistan Daily Times
These highly skilled groups are collaborating to discover new vulnerabilities in the financial markets and government-run institutions In 2011, diplomatic ruction between the US and China over the establishment of North Korea's cyber army (180000 cyber ...
See all stories on this topic »
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage ...
Lawfare (blog)
by Joel Brenner Joel Brenner's America the Vulnerable offers the best general-interest treatment I have yet read of this country's cyber-vulnerabilities. It is elegantly argued, teeming with facts and illuminating anecdotes, sophisticated about ...
See all stories on this topic »
The Computer Science of Insecurity
iProgrammer
If you take a look at one of the best known software vulnerabilities, SQL Injection, you immediately get a gut reaction that there is something wrong in principle. You have to wonder why a powerful language like SQL is exposed to the user in the first ...
See all stories on this topic »
Mitt Romney's easy path thus far in GOP race surprises experts and dismays ...
Washington Post
Romney's injury-free journey is all the more surprising because, despite some obvious campaign skills, he has well-known vulnerabilities ripe for attack. The turn of events has astonished campaign pros in both parties, who expected Romney to be more ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Wednesday, December 28, 2011

Google Alert - vulnerabilities

News9 new results for vulnerabilities
 
GSM phones vulnerable to hijack scams: researcher
Reuters
But Nohl said he has discovered a way to leverage previously disclosed vulnerabilities in GSM technology that could potentially threaten hundreds of thousands of phones. "We can do it to hundreds of thousands of phones in a short time frame," Nohl told ...
See all stories on this topic »
Wi-Fi Pin Vulnerability Discovered By Research Team
The Inquisitr
Vulnerabilities exist for some D-Link, Netgear, Linksys and Buffalo routers (others likely suffer from the same issue but were not tested). Viehbock says he has been ignored by hardware vendors despite using a proof of concept Python tool to break ...
See all stories on this topic »
Nepal-India-China partnership must for tackling CC vulnerabilities
Telegraphnepal.com
Kathmandu: It was unquestionably a national seminar with a distinction in that the topic being discussed was kept at a distance from what the Kathmandu seminarians conduct such colloquium which at best remains limited to the periphery of the stale and ...
See all stories on this topic »

Telegraphnepal.com
Why A Mobile Device Operating System's Security Model is important
Windows IT Pro (blog)
With computer operating systems we have regular updates to deal with these vulnerabilities as they arise. This isn't always the case with mobile phone operating systems where vendors have a more relaxed attitude towards software updates once someone ...
See all stories on this topic »
DHS Secret Meet on Domestic Threats
Cryptome.org
DHS has determined that public disclosure of this information would significantly compromise the operational security of the nation's transportation system if disclosed, by exposing the existing vulnerabilities and the physical limitations of the ...
See all stories on this topic »
Personal and Team Security Management
Reuters AlertNet
Threats, risks and vulnerabilities assessment including actor mapping. Management Approach to Security: Elements of Security Management Framework and threshold of acceptance. Specific threat/safety management Aspects: Security awareness, ...
See all stories on this topic »
Is Smart Grid Cyber Security a Losing Game?
IT Business Edge (blog)
The study, according to the Christian Science Monitor, reports that the security features being added to the traditional power infrastructure are being overmatched by the vulnerabilities being introduced. The findings are aptly summed up in the story: ...
See all stories on this topic »
Gazprom ties South Stream to talks in Kiev
UPI.com
A 2009 contract dispute between Ukrainian officials and Gazprom exposed vulnerabilities in the European natural gas market when the Russian company briefly halted deliveries through Ukraine. Europe gets about 20 percent of its natural gas from Russia ...
See all stories on this topic »
Trillions seeking refuge
EconoMonitor (blog)
Overall, I feel this is a balanced account of Turkey's strengths and vulnerabilities. It argues capital may continue to flow to emerging markets next year despite the Eurozone crisis, and if that were to materialize, Turkey may indeed fare well. ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Tuesday, December 27, 2011

Google Alert - vulnerabilities

News3 new results for vulnerabilities
 
DIY security testing
Sydney Morning Herald
Organisations need to stay on top of vulnerabilities on all of their systems," says Sam Bryce-Johnson, engineer at computer security company Kaspersky Lab. But he warns security issues can be extremely complex, and in order to have a sound ...
See all stories on this topic »

Sydney Morning Herald
Q: Where can I see a detailed report of security vulnerabilities for Microsoft ...
Windows IT Pro
A: Microsoft produces a report that provides detailed findings on the state of Microsoft security initiatives and exploits in the previous six months. As of publication time for this FAQ, the most recent report can be found at "Microsoft Security ...
See all stories on this topic »

Windows IT Pro
Secure Your Websites with a File Integrity Checker
TheHostingNews.com (press release)
The problem with this concept is that it fails to account for the possibility that one of those vulnerabilities may have already been exploited. Just because a security problem with your website is not apparent does not mean that someone has not ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Sunday, December 25, 2011

Google Alert - vulnerabilities

News3 new results for vulnerabilities
 
Failures expose vulnerabilities
Citizens Voice
Warren Ruda / The Citizens' Voice The cases against former judges Mark A. Ciavarella Jr., left, and Michael T. Conahan led to the creation of new safeguards in the juvenile justice system. HARRISBURG - Pennsylvania's elected officials have spent this ...
See all stories on this topic »

Citizens Voice
Nepal: Climate Change Vulnerabilities and Adaptation
Telegraphnepal.com
In 2010,Maplecroft a global risks advisory firm published a Climate Change Vulnerability Index (CCVI) and ranked Nepal as the fourth most vulnerable country to the impacts of climate change.A later iteration of the CCVI, released in 2011 by Maplecroft ...
See all stories on this topic »

Telegraphnepal.com
Income and Education Predict African-American Couples' Stability
GoodTherapy.org (blog)
In a recent study, Carolyn E. Cutrona of the Department of Psychology at Iowa State University used the vulnerability-stress-adaptation model of adaptive processes, stressful life events and enduring vulnerabilities to gauge marital stability in ...
See all stories on this topic »


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.

Saturday, December 24, 2011

Google Alert - vulnerabilities

News8 new results for vulnerabilities
 
HP firmware to 'mitigate' LaserJet vulnerability
CNET
The specific vulnerability exists for some HP LaserJet devices if placed on a public internet without a firewall. In a private network, some printers may be vulnerable if a malicious effort is made to modify the firmware of the device by a trusted ...
See all stories on this topic »

CNET
Vulnerability Found in Kaspersky Security Software
eSecurity Planet
"Researchers from Vulnerability Laboratory found a flaw caused by an invalid pointer corruption when processing a corrupt .cfg file through the Kaspersky exception filters," writes Softpedia's Eduard Kovacs. "The bug seems to be located in basegui.ppl ...
See all stories on this topic »
Mozilla Fixes HTML5, Memory Corruption Bugs in Firefox 9
eWeek
Mozilla fixes six vulnerabilities in Firefox 9, the latest version of its popular Web browser. Two of patches address issues with HTML5. Less than a day after Mozilla released its latest version of the Firefox Web browser, the company released a ...
See all stories on this topic »
Homeland Security issues advisory to nation's critical infrastructure industry
Examiner.com
December 23, 2011 The US Department of Homeland Security has issued an advisory about security vulnerabilities in Siemens SCADA systems, which runs much of the world's industrial infrastructure, including in the United States. ...
See all stories on this topic »
EG High School student techies compete in national cybersecurity competition
Elk Grove Citizen
These annoying issues are typically due to vulnerabilities that are often hidden within the computer's makeup. The pesky "techno-hazards" are weaknesses inside the computer's files that leave openings for hackers to easily input viruses in your ...
See all stories on this topic »
The silent attackers...
Gulf Daily News
These applications contain a plethora of vulnerabilities that can be remotely exploited by an attacker to get unauthorised access to his victim's computer. The applications could be attacked in many ways. The easiest way would be to send a fraudulent ...
See all stories on this topic »
To Stop Cybercrime: Understand Crime Logic, And Adapt
Forbes
Web application vulnerabilities are discovered and used to compromise legitimate websites and force them to serve malware to selected visitors. Browser vulnerabilities and vulnerabilities in content readers such as Acrobat and Flash are used to drive ...
See all stories on this topic »

Forbes
Siemens working to fix security flaws
Times of Oman
The German conglomerate, whose industrial control systems are widely used around the world, said on Thursday in a posting on its website that it had learned of the vulnerabilities in May and December of this year from security researchers Terry ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Friday, December 23, 2011

Google Alert - vulnerabilities

News8 new results for vulnerabilities
 
Siemens to fix vulnerabilities in industrial control systems
VR-Zone
Siemens has revealed that it is developing security fixes for a number of vulnerabilities in its industrial control products, which could be used by hackers to knock out critical infrastructure like electricity grids, water supplies, oil rigs, ...
See all stories on this topic »

VR-Zone
Zero-day exploit in Windows 7 64-bit may allow remote code execution
ComputerworldUK
The security flaw stems from an error in the win32k.sys kernel-mode driver, a common source for critical Windows vulnerabilities. The exploit has so far only been confirmed on Windows 7 64-bit when parsing an iframe with an overly-long height attribute ...
See all stories on this topic »
Google Must Deal with Android Security Problems Quickly
IT Business Edge (blog)
The bottom line is that the security vulnerabilities of Android must be confronted and rectified, even if businesses and the government don't intend to use Android for sensitive matters. In other words, its use simply is beyond the control of the ...
See all stories on this topic »
Security researcher recommends ditching Java
Computing
By Stuart Sumner A security expert has warned users to uninstall Oracle's Java platform from their machines, as the software creates too many exploitable vulnerabilities. Writing on his blog, Mikko Hypponen, CRO at security firm F-Secure explained that ...
See all stories on this topic »

Computing
Microsoft's December Update comes with 13 Security Patches
SPAMfighter News
Microsoft has released its December cycle of security update containing 13 patches to address 3 critical vulnerabilities, with one which the currently notorious Duqu worm exploits, published softpedia on December 14, 2011. Security Intelligence Manager ...
See all stories on this topic »
Agencies struggle with continuous monitoring mandate
FederalNewsRadio.com
"Others believe, and I think this is where the NIST guidance comes down, continuous monitoring is something you do of the whole IT enterprise, but you do it in essence offline so you identify where your holes are, where you greatest vulnerabilities and ...
See all stories on this topic »
QCB warns banks on cyber crime threat
Gulf Times
In support of this, the committee will be delivering up-to-date safety information about threats and vulnerabilities to the public via mobile phones, ATM screens, bank statements, websites and all other relevant banking digital media. ...
See all stories on this topic »
Resilience in Complex Supply Networks
EBN
As extended supply chains in the high-tech industry continue to straddle multiple geographies, new vulnerabilities get introduced. Each additional supplier, manufacturing site, or distribution center is a potential failure point in the extended network ...
See all stories on this topic »


Tip: Use site restrict in your query to search within a site (site:nytimes.com or site:.edu). Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Thursday, December 22, 2011

Google Alert - vulnerabilities

News8 new results for vulnerabilities
 
phpMyAdmin 3.4.9 fixes XSS vulnerabilities
The H
The update fixes vulnerabilities in the phpMyAdmin setup interface and the export panels in the server, database and table sections that could be exploited for cross-site scripting (XSS) attacks. All 3.4.x versions up to and including 3.4.8 are ...
See all stories on this topic »
Application Security, Inc.'s TeamSHATTER Research Organization Selected As ...
MarketWatch (press release)
In 2011, TeamSHATTER researchers were credited with discovering the majority of database vulnerabilities in the Oracle CPUs and have been credited for reporting vulnerabilities in 26 of the last 28 quarters. While TeamSHATTER continues to be the most ...
See all stories on this topic »
Android Overload: Dell Streak Gets Official Gingerbread Update, More Android ...
Phandroid.com
by Chris Chavez on December 22nd, 2011 at 5:00 am Greetings, Phandroids! I'm sure by now, most of you know the drill but I'll go ahead and explain it for the noobies. You have wandered into the Android Overload. This is the place where we stash all of ...
See all stories on this topic »
Clever patching keeps the system serviceable
Register
In 2010, 69 per cent of the sources of vulnerabilities on endpoints were found to have originated with third-party programs. In 2006, patching Microsoft applications and the operating system on the average endpoint would have eliminated 55 per cent of ...
See all stories on this topic »
More Sykipot Malware Clues Point To China
InformationWeek
But the Sykipot family of malware only appeared to become widespread last year, via obfuscated script files that exploited Internet Explorer vulnerabilities to execute arbitrary code. Interestingly, the Alienvault researchers found that while many of ...
See all stories on this topic »
nCircle Benchmark Adds Premium Edition Patch Management Scorecards and Support ...
MarketWatch (press release)
Enterprises are facing more pressure to eliminate vulnerabilities in third party applications and operating systems to improve security and compliance. At the same time, device diversity on corporate networks is rising rapidly. ...
See all stories on this topic »
Mozilla launches Firefox 9, speeds up JavaScript
Computerworld
The company also patched six Firefox vulnerabilities, and released a security update to the nearly-two-year-old Firefox 3.6 to quash a single bug there. Firefox 9, released six weeks after November's Firefox 8, uses a technology called "type inference" ...
See all stories on this topic »
Where is Internet Banking safety in India heading?
Blogger News Network (blog)
If other Banks also exhibit similar vulnerabilities, the IS auditors who might have audited the respective Banks and given them a certificate of satisfactory security status need to also take the responsibility. I suggest RBI to call for copies of the ...
See all stories on this topic »


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.

Wednesday, December 21, 2011

Google Alert - vulnerabilities

News8 new results for vulnerabilities
 
Software Security: Fewer Vulnerabilities In 2011
InformationWeek
There was a decline in the number of software security vulnerabilities disclosed to the public, as well as the proportion of flaws that were exploited. Is secure development paying off? By Robert Lemos, Dark Reading Cyberattackers had significant ...
See all stories on this topic »
New Zero-day Vulnerability in Windows 7 64-bit May Allow Remote Code Execution
PCWorld
By Lucian Constantin, IDG-News-Service:Romania-Bureau Microsoft is currently investigating reports of a zero-day vulnerability in Windows 7 64-bit that leads to crashes and could allow attackers to execute arbitrary code on affected systems. ...
See all stories on this topic »
ComGuard Unveils Acunetix Web Vulnerability Scanner 8 Beta
Newswire Today (press release)
NewswireToday - /newswire/ - Dubai, UAE, United Arab Emirates, 12/20/2011 - ComGuard introduces the latest version of Acunetix Web Vulnerability Scanner 8 beta to optimise the web security in the Middle East region. Rank or share this free Newswire ...
See all stories on this topic »
IBM, Microsoft, HP Slow to Fix Software Bugs
ITProPortal
TippingPoint purchased security vulnerabilities from independent researchers and reported these vulnerabilities to a variety of companies. TippingPoint also used these vulnerabilities to strengthen its own security software offerings. ...
See all stories on this topic »

ITProPortal
New website to combat arsonists
Herald Sun
"It is the communities that know where the vulnerabilities are in their local areas, those areas which are prone to fires," he said in Canberra. "It's the communities that can identify suspicious conduct." The website tells people who to contact if ...
See all stories on this topic »
Application Security, Inc.'s AppDetectivePro, DbProtect Named Finalists In ...
MarketWatch (press release)
AppSecInc's database security platform, DbProtect, has been named as a finalist in the Best Security Software, Best Database Security, and Best Vulnerability Assessment, Remediation, Management Solution categories. AppDetectivePro has been chosen as a ...
See all stories on this topic »
Will 'Anonymous' Hack the Iowa Caucuses?
Big Government
The second is a SQL injection, which inserts a code into a website's software, thereby exploiting its vulnerabilities and forcing it to execute the hacker's code. It wouldn't be the first time that SQL insertions were used to try to rock the vote. ...
See all stories on this topic »
SurDoc Raises $4 Million For Sharing Formatted Documents Across All Platforms
TechCrunch
The difference it offers is that you don't need to mess with any file formating or PDF reader to access the documents — or with all of the vulnerabilities of PDFs. You can just upload text, spreadsheet and presentation files (so Word, Excel, ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.