Friday, December 23, 2011

Google Alert - vulnerabilities

News8 new results for vulnerabilities
 
Siemens to fix vulnerabilities in industrial control systems
VR-Zone
Siemens has revealed that it is developing security fixes for a number of vulnerabilities in its industrial control products, which could be used by hackers to knock out critical infrastructure like electricity grids, water supplies, oil rigs, ...
See all stories on this topic »

VR-Zone
Zero-day exploit in Windows 7 64-bit may allow remote code execution
ComputerworldUK
The security flaw stems from an error in the win32k.sys kernel-mode driver, a common source for critical Windows vulnerabilities. The exploit has so far only been confirmed on Windows 7 64-bit when parsing an iframe with an overly-long height attribute ...
See all stories on this topic »
Google Must Deal with Android Security Problems Quickly
IT Business Edge (blog)
The bottom line is that the security vulnerabilities of Android must be confronted and rectified, even if businesses and the government don't intend to use Android for sensitive matters. In other words, its use simply is beyond the control of the ...
See all stories on this topic »
Security researcher recommends ditching Java
Computing
By Stuart Sumner A security expert has warned users to uninstall Oracle's Java platform from their machines, as the software creates too many exploitable vulnerabilities. Writing on his blog, Mikko Hypponen, CRO at security firm F-Secure explained that ...
See all stories on this topic »

Computing
Microsoft's December Update comes with 13 Security Patches
SPAMfighter News
Microsoft has released its December cycle of security update containing 13 patches to address 3 critical vulnerabilities, with one which the currently notorious Duqu worm exploits, published softpedia on December 14, 2011. Security Intelligence Manager ...
See all stories on this topic »
Agencies struggle with continuous monitoring mandate
FederalNewsRadio.com
"Others believe, and I think this is where the NIST guidance comes down, continuous monitoring is something you do of the whole IT enterprise, but you do it in essence offline so you identify where your holes are, where you greatest vulnerabilities and ...
See all stories on this topic »
QCB warns banks on cyber crime threat
Gulf Times
In support of this, the committee will be delivering up-to-date safety information about threats and vulnerabilities to the public via mobile phones, ATM screens, bank statements, websites and all other relevant banking digital media. ...
See all stories on this topic »
Resilience in Complex Supply Networks
EBN
As extended supply chains in the high-tech industry continue to straddle multiple geographies, new vulnerabilities get introduced. Each additional supplier, manufacturing site, or distribution center is a potential failure point in the extended network ...
See all stories on this topic »


Tip: Use site restrict in your query to search within a site (site:nytimes.com or site:.edu). Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home