Tuesday, December 20, 2011

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
Zero Day Initiative: One Year After Throwing Down The Disclosure Gauntlet
Dark Reading
By Kelly Jackson Higgins Most of the zero-day vulnerabilities reported this year were in products from 10 of the biggest names in software. Some 81 percent of the published and upcoming zero-day advisories from HP TippingPoint DVLabs' Zero Day ...
See all stories on this topic »
NSP: Breakdowns demonstrate vulnerabilities of relying on a monopoly for ...
The Online Citizen (blog)
The recent spate of breakdowns in Singapore Mass Rapid Transit (SMRT) services has clearly demonstrated the vulnerabilities of relying on a monopoly for essential services, regardless of how efficient and reliable it has been in the past. ...
See all stories on this topic »
Web malware exploitation kits updated with new Java exploit
ZDNet (blog)
Instead, the cybercriminals rely on already patched vulnerabilities, whose active exploitation is the primary objective of web malware exploitation kits. Based on third-party research from multiple sources, we can clearly conclude that end users aren't ...
See all stories on this topic »
Nation's nuclear power watchdog comes up short on FISMA compliance
CSO
Revise existing configuration management procedures to include performance measures and/or monitoring procedures to ensure all identified vulnerabilities, including configuration-related vulnerabilities, scan findings, and security patch-related ...
See all stories on this topic »
Adobe Finally Updates Critical Reader Bug
TechWeekEurope UK
Adobe Systems has delivered on its promise and finally released a patch addressing zero-day vulnerabilities in Adobe Reader and Acrobat 9.4.6. Windows users are the only ones receiving the Adobe Acrobat and Reader 9.4.7 for Windows update, ...
See all stories on this topic »

TechWeekEurope UK
CMS inaction leaves system holes for fraud, abuse
FierceHealthcare
As of January, CMS has not resolved or taken action on more than three-fourths (77 percent) of identified vulnerabilities--mostly having to do with coding/billing and provider identifiers--reported by Program Safeguard Contractors, Zone Program ...
See all stories on this topic »
Review: 'Dragon Tattoo' is well-made Hollywood version of dark Swedish thriller
Lincoln Journal Star
"The Girl With the Dragon Tattoo" delves into the darkness of a family and the vulnerabilities of its two investigators while playing somewhat like a romance. Even then, it doesn't follow convention, delivering its central relationship with edge, ...
See all stories on this topic »
2011 Women of Influence award winners named
IDG News Service
Moussouris also founded and runs Microsoft Vulnerability Research, which is responsible for Microsoft's research and reporting of vulnerabilities in 3rd party software. Moussouris recently was voted the editor of a new draft ISO standard on ...
See all stories on this topic »
How To Manage the Weak Link in Cybersecurity: Humans
CRN (blog)
Since security threats are constantly evolving, leadership responses to human security vulnerabilities must likewise exist in a context of constant evolution. Resistance to change, closer individual scrutiny and human curiosity are inherent obstacles ...
See all stories on this topic »
Grading the Field
Wall Street Journal
And so, I think she exposed some vulnerabilities there in the frontrunners. But I think you're right, by and large, the frontrunners pretty much laid off one another and let the second-tier candidates go after them. Gigot: I want to deal with each of ...
See all stories on this topic »


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home