Wednesday, December 14, 2011

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
Chrome 16 Fixes High, Medium-risk Vulnerabilities
PCWorld
By Lucian Constantin, IDG-News-Service:Romania-Bureau Google has released Chrome 16, a new stable version of its Web browser that addresses 15 high- and medium-risk vulnerabilities. Four of the security flaws patched in this release stem from errors in ...
See all stories on this topic »
No BEAST fix from Microsoft in December patch batch
Register
By John Leyden • Get more from this author Microsoft released 13 security bulletins addressing 19 vulnerabilities overnight, as part of a bumper final Patch Tuesday of the year. Highlight of the baker's dozen is a patch for the the zero-day ...
See all stories on this topic »
GUI Tool Reveals SQL Injection Vulnerabilities
iProgrammer
A free utility that you can use to demonstrate SQL injection vulnerabilities in web apps has been released by web security specialists, NT OBJECTives. NTO SQL Invader is interesting because it isn't designed to find the vulnerability; instead, ...
See all stories on this topic »
Winamp Update Addresses Three Remote Code Execution Vulnerabilities
PCWorld
By Lucian Constantin, IDG-News-Service:Romania-Bureau Nullsoft has released Winamp 5.623, a new version of its popular media player application, in order to address three vulnerabilities that could allow remote attackers to execute arbitrary code on ...
See all stories on this topic »
Adobe Patches ColdFusion but No Sign of Reader Fix
eWeek
Adobe releases a fix for the ColdFusion Web application development platform, but it said it hasn't set a date for a fix for the Adobe Reader critical zero-day vulnerability. Adobe released a patch addressing vulnerabilities in its ColdFusion Web ...
See all stories on this topic »
DHS, FBI Give SCADA System Vulnerability Warning
InformationWeek
"ICS-CERT has coordinated this information with the identified control system owners and operators to notify them of their potential vulnerability to cyber intrusion and attack." Control systems need not be Internet-connected, but when they ...
See all stories on this topic »
TD Economics: U.S. Economy Showing Growth, But Vulnerabilities Remain Abroad ...
PR Newswire (press release)
Project growth to accelerate to 3.2% in closing months of 2011; slight rise of 1.9% in 2012 and 2.3% in 2013. CHERRY HILL, NJ and PORTLAND, Maine, Dec. 14, 2011 /PRNewswire/ -- Despite encouraging signs of progress over the last few months, ...
See all stories on this topic »
McCann E-Investigations Houston Publishes Computer Forensics Video ...
DigitalJournal.com (press release)
Timely identification and remediation of network vulnerabilities is something every organization requires to prevent hackers or disgruntled insiders from exploiting the weaknesses. The process of identifying vulnerabilities, evaluating the risk, ...
See all stories on this topic »
Windows Phone 7.5 suffers a SMS denial of service flaw
Inquirer
Apple's IOS and Google's Android have had SMS-related security vulnerabilities, and perhaps the marketeers at Microsoft will see it as a sign of Windows Phone's popularity that it too is starting to become a target of security researchers. µ.
See all stories on this topic »
Managing Catastrophe Model Uncertainty, Issues and Challenges: Part III, Using ...
GC Capital Ideas
management can begin to get a sense of vulnerabilities in the business. But it is hard to assess how realistic a particular scenario might be. Using historical events as the basis for scenarios incorporates the fact that those events did, in fact, ...
See all stories on this topic »

GC Capital Ideas


Tip: Use a minus sign (-) in front of terms in your query that you want to exclude. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home