Saturday, December 24, 2011

Google Alert - vulnerabilities

News8 new results for vulnerabilities
 
HP firmware to 'mitigate' LaserJet vulnerability
CNET
The specific vulnerability exists for some HP LaserJet devices if placed on a public internet without a firewall. In a private network, some printers may be vulnerable if a malicious effort is made to modify the firmware of the device by a trusted ...
See all stories on this topic »

CNET
Vulnerability Found in Kaspersky Security Software
eSecurity Planet
"Researchers from Vulnerability Laboratory found a flaw caused by an invalid pointer corruption when processing a corrupt .cfg file through the Kaspersky exception filters," writes Softpedia's Eduard Kovacs. "The bug seems to be located in basegui.ppl ...
See all stories on this topic »
Mozilla Fixes HTML5, Memory Corruption Bugs in Firefox 9
eWeek
Mozilla fixes six vulnerabilities in Firefox 9, the latest version of its popular Web browser. Two of patches address issues with HTML5. Less than a day after Mozilla released its latest version of the Firefox Web browser, the company released a ...
See all stories on this topic »
Homeland Security issues advisory to nation's critical infrastructure industry
Examiner.com
December 23, 2011 The US Department of Homeland Security has issued an advisory about security vulnerabilities in Siemens SCADA systems, which runs much of the world's industrial infrastructure, including in the United States. ...
See all stories on this topic »
EG High School student techies compete in national cybersecurity competition
Elk Grove Citizen
These annoying issues are typically due to vulnerabilities that are often hidden within the computer's makeup. The pesky "techno-hazards" are weaknesses inside the computer's files that leave openings for hackers to easily input viruses in your ...
See all stories on this topic »
The silent attackers...
Gulf Daily News
These applications contain a plethora of vulnerabilities that can be remotely exploited by an attacker to get unauthorised access to his victim's computer. The applications could be attacked in many ways. The easiest way would be to send a fraudulent ...
See all stories on this topic »
To Stop Cybercrime: Understand Crime Logic, And Adapt
Forbes
Web application vulnerabilities are discovered and used to compromise legitimate websites and force them to serve malware to selected visitors. Browser vulnerabilities and vulnerabilities in content readers such as Acrobat and Flash are used to drive ...
See all stories on this topic »

Forbes
Siemens working to fix security flaws
Times of Oman
The German conglomerate, whose industrial control systems are widely used around the world, said on Thursday in a posting on its website that it had learned of the vulnerabilities in May and December of this year from security researchers Terry ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home