Tuesday, January 31, 2012

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
Car-hacking a growing risk with electronics frenzy
The News Journal
"There clearly is a vulnerability," said Adrian Lund, president of the Insurance Institute for Highway Safety, based in Arlington, Va. "All these electronics we're bringing into cars seem to exacerbate that." A National Academy of Sciences panel, ...
See all stories on this topic »
Many pcAnywhere systems still sitting ducks
InfoWorld
Over the weekend, vulnerability management firm Rapid7 scanned for exposed systems running pcAnywhere and found that tens of thousands of installations could likely be attacked through unpatched vulnerabilities in the software because they directly ...
See all stories on this topic »
Info Security Products Guide Eighth Annual 2012 Global Excellence Awards Names ...
EON: Enhanced Online News (press release)
With an ever-growing library of over 50000 checks, Suite360 offers the greatest breadth and depth of coverage for automatically discovering vulnerabilities, applications and services—auditing configuration compliance and monitoring file integrity ...
See all stories on this topic »
Navy Secretary Affirms Clean Energy Plans
Harvard Crimson
"When you run a military organization...you look for vulnerabilities," Mabus said. "Our energy dependence jump[s] out as one of the biggest vulnerabilities we have today." Mabus, who has held office since 2009, has pledged for 50 percent of all ...
See all stories on this topic »
Hackers Infect WordPress 3.2.1 Blogs to Distribute TDSS Rootkit
PCWorld
It's not clear how the websites are being compromised, but there are publicly known exploits for vulnerabilities that affect WordPress 3.2.1, which is an older version of the popular blog publishing platform. Once they gain unauthorized access to a ...
See all stories on this topic »
Breaches, like history, repeat themselves
Network World
The firm found that attackers like to target five relatively common application vulnerabilities: remote file inclusion, SQL injection, local file inclusion, cross site scripting and directory traversal attacks. The majority of these attack vectors have ...
See all stories on this topic »
Del Monte Foods Selects Wombat Security Technologies' Security Training ...
PR Web (press release)
Del Monte is utilizing Wombat's entire Security Training Platform to assess internal vulnerability and to train its workforce to recognize the numerous cyber-attacks launched on organizations every day. "Wombat's Platform enables us to assess internal ...
See all stories on this topic »
A lesson from Lee Atwater
Washington Post (blog)
Romney still has vulnerabilities, and his biggest vulnerability today is an insufficient win tomorrow. If tomorrow is a double-digit win, February looks good for Romney. Anything less than that, and the Romney campaign has some explaining to do.
See all stories on this topic »
Quake fear prompts evaluations of public schools, power utility
Dominican Today
"It has vulnerabilities and has two options to reinforce it: reinforced concrete, and the other a metallic structure. If reinforced it's with reinforced concrete, we would have to build 40cm thick, L shape walls in each corner of the building, ...
See all stories on this topic »
Polls Show Split Opinion On Romney's Business Record
National Journal
The numbers suggest that Romney's work at Bain and his wealth are vulnerabilities, but hardly a silver bullet that will significantly hurt his general election prospects against President Obama. It's useful to think about Romney's vulnerabilities in ...
See all stories on this topic »


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.

Monday, January 30, 2012

Google Alert - vulnerabilities

News5 new results for vulnerabilities
 
Researchers to patent vulnerability search algorithm
iT News
By Liz Tay on Jan 30, 2012 3:00 PM (6 hours ago) Melbourne-based researchers are looking to commercialise a search algorithm that analyses networks to identify the most easily exploitable vulnerability chains. The algorithm was developed by Swinburne ...
See all stories on this topic »
Hacking Seen as Rising Risk With Car Electronics
Bloomberg
Instead, they said, they want to help automakers spot vulnerabilities while they're hypothetical and ease fears of consumers who are already familiar with cyberattacks in other areas. Listening In Car thieves could exploit security weaknesses to ...
See all stories on this topic »
Skipping security is human nature
ZDNet Australia (blog)
"If those three things don't exist, then I have very little drive to [fix] those vulnerabilities," he said. IT managers instead focus on areas where there's more pressure, such as connecting the ever-increasing number of smartphones and tablets.
See all stories on this topic »
Facebook rewards hackers who find bugs
San Francisco Chronicle
IBM's X-Force security unit says that worldwide, more than 7000 vulnerabilities are disclosed per year. The actual number is probably higher, because not all discoveries are made public. Social-networking sites such as Facebook are particularly ...
See all stories on this topic »
Year of the cloud? Not until it can shield world's Mitnicks
Register
"When vulnerabilities come out in third-party vendor software, he is one of the first targets on their list. This is just one of the perils of being Kevin Mitnick. If you're Barack Obama, you don't get webhosting at GoDaddy.
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Sunday, January 29, 2012

Google Alert - vulnerabilities

News5 new results for vulnerabilities
 
City and Colour play off their vulnerabilities
Calgary Herald
Don't be afraid to show your soft side, your vulnerability, your heart - ripped from your chest, bloodied, bruised and still beating - on your sleeve. You'll probably find people will empathize, possibly engage, and maybe even love you for it.
See all stories on this topic »
Assets shrink as banks return to old model
Financial Times
By Diana Mackay Recent experience illustrates the persistent vulnerabilities of the European fund industry, which has been built on a foundation of retail assets gathered over the past two decades by the large universal banks. They were responsible for ...
See all stories on this topic »

Financial Times
New Buzz For Fuzz-o-Matic TaaS
Dr. Dobb's
Despite being somewhat scant on details of exactly how regularly updated or dynamic its test cases are, the company claims to provide software application developers with a means of uncovering previously-unknown vulnerabilities before hackers do, ...
See all stories on this topic »
KP govt devises top priority to mitigate natural hazards
Pakistan Observer
The Minister was addressing a group of experts from Khyber Pakhtunkhwa who had come to participate in Orientation workshop of the project titled "Reducing Risks and Vulnerabilities from Glacier Lake Outburst Floods in Northern Pakistan" to minimize the ...
See all stories on this topic »
National Urban Livelihoods Mission to Focus on Skill Up-Gradation ...
VAdvert Press Center (press release)
We are now looking at the urban poverty from the context of vulnerabilities. Urban poor suffer from various vulnerabilities which can be broadly referred to as residential, social and occupational vulnerabilities. The residential vulnerability is ...
See all stories on this topic »


Tip: Use a minus sign (-) in front of terms in your query that you want to exclude. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Saturday, January 28, 2012

Google Alert - vulnerabilities

News8 new results for vulnerabilities
 
Romney displayed many vulnerabilities at CNN debate
Human Events
by Tony Lee At Thursday's CNN Republican presidential debate, Mitt Romney won the immigration exchange with Newt Gingrich. But three specific instances again left those who may have been warming to Romney with concern that the former Massachusetts ...
See all stories on this topic »
How SCADA highlights the futility of finding security vulnerabilities
ZDNet (blog)
The many flavors of vulnerability disclosure have a long history in the information security field. While security professionals sometimes support a moderate form of managed disclosure, the introduction of higher consequences associated with SCADA ...
See all stories on this topic »

ZDNet (blog)
Forbes Exploited: XSS Vulnerabilities Allow Phishers to Hijack Sessions ...
Business Insider
Ucha Gobejishvili, a Georgian Security Researcher under the handle of longrifle0x, discovered two cross site scripting (XSS) vulnerabilities on the official website of Forbes. He discovered the hole in two different locations on the site, ...
See all stories on this topic »
Linux: a lot of hullabaloo about a vulnerability
Generation NT (US)
A lot of noise has been made about a security vulnerability affecting the Linux core. The fault has been corrected and Linux editors are updating all of their systems after exploits appeared on the web. Security vulnerabilities affecting the Linux core ...
See all stories on this topic »
Windows 7 Media Player Security Flaws
Windows 7 News
Two weeks ago Microsoft issued a security bulletin regarding at least eight vulnerabilities affecting all versions of the Windows operating system. The company was urging Windows users to pay special attention to MS12-004, which is a "critical" ...
See all stories on this topic »
Netop Offers Remote Control Free Trial and Special Offer to pcAnywhere Users
Business Wire (press release)
Symantec also confirmed that old source code stolen by a hacking group has exposed vulnerabilities in the pcAnywhere remote access program. Discussing the issue Netop's CEO Kurt Bager said: "Symantec's announcement highlights the risks of having ...
See all stories on this topic »
Symantec warns customers to stop using pcAnywhere
CCL Online
The security firm says that a hacking group has stolen "old" source code, thereby exposing a vulnerability in the remote access program. "At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates ...
See all stories on this topic »
Kenyan Officials Say Government Sites Hit By Indonesian Hacker
CSO
That vulnerability can be exploited because of "poor programming practices" and regular penetration testing by the attacker, he said. The websites were hosted on one server and the sites had operating-system vulnerabilities, running outdated OSes, ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Friday, January 27, 2012

Google Alert - vulnerabilities

News7 new results for vulnerabilities
 
Symantec warns of severe vulnerability with pcAnywhere product
Computing
By Stuart Sumner Security firm Symantec has warned its customers of high severity vulnerabilities in its pcAnywhere product. In a notice published on its webiste this week, the firm admitted that hackers are currently able to gain remote access to a ...
See all stories on this topic »

Computing
Lana Del Rey Reveals Her Vulnerabilities
PopCrush
However, she's revealed some vulnerabilities, like that fact that she's sincere and is sober because she has to be. In her chat with The Telegraph, Del Rey showed a knowledge of her critics and acute self-awareness, saying, "I'm 100 percent sincere.
See all stories on this topic »
Opera 11.61 Patches Security Flaws
eSecurity Planet
The update addresses a high severity XSS vulnerability, as well as a low severity issue. Version 11.61 of the Opera browser was recently released, fixing two vulnerabilities. "Opera 11.61 addresses a "high" severity cross-site scripting (XSS) ...
See all stories on this topic »
Google's revised privacy policy not sitting well with some
Infosecurity Magazine (US)
Google has plugged a number of serious vulnerabilities in its Chrome browser and paid out $6133.70 in bug bounties. Google plans to consolidate and simplify over 70 privacy documents covering its different products into a single privacy policy, ...
See all stories on this topic »
Jeff Green Testifies on US Inactivity regarding Strategic Materials
MarketWatch (press release)
To mitigate US economic and national security vulnerabilities, Mr. Green offered recommendations for inclusion in future legislation. "We, in the United States, now face a choice. We can continue to ignore this to our detriment, or we can lay the ...
See all stories on this topic »
Mobile Payment Technology Gotchas
InformationWeek
How can companies find and fix vulnerabilities before they lead to a breach? Better yet, how can software developers identify flaws in their applications before the new software is ever deployed? In this report, Eliminating Vulnerabilities In ...
See all stories on this topic »
Symantec Warns Customers Not To Use PcAnywhere
CRN
Only the latter software contained vulnerabilities exposed as a result of the theft. "At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks," ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Thursday, January 26, 2012

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
Pwn2Own Contest Puts Bounty On Browser Vulnerabilities
Security Pronews
This year, at the CanSecWest in Vancouver, companies like HP and Google are offering rewards for hackers and research teams who can exploit zero-day vulnerabilities within the most common browsers. This contest, known as Pwn2Own, has been an annual ...
See all stories on this topic »
Pwn2Own Hacking Contest Gets Facelift
InformationWeek
And ZDI will throw in another new element for the contestants to crack: patched vulnerabilities in which the researchers at ZDI have discovered holes. "On the first day of the contest, we will announce two patched vulnerabilities per target that my ...
See all stories on this topic »
Zimbabwe: All Enterprises Are Vulnerable to Security Risk
AllAfrica.com
Vulnerability assessment is one of the building blocks in the security risk assessment process. It actually provides the essential ingredients for compilation of the Enterprise Security Risk Register. Vulnerability assessment is carried out in relation ...
See all stories on this topic »
World Bank: Bahamas must address vulnerabilities
Nassau Guardian
A top economist from the World Bank says The Bahamas and Caribbean at large will likely experience slower growth in 2012 due to its vulnerability to swings in the US and Europe. If countries in the region hope to prosper, there must be an honest ...
See all stories on this topic »
Imperva Inc. : Business Logic Attacks Attractive To Hackers, Imperva Finds
Reuters
The WAAR outlines the frequency, type and geography of origin of each attack to help security professionals better prioritize vulnerability remediation. "Business logic attacks are attractive for hackers since they follow a legitimate flow of ...
See all stories on this topic »
Symantec advises disabling pcAnywhere software
BBC News
The company confirmed that "old" source code stolen by a hacking group had exposed vulnerabilities in the remote access program. An advisory note on Symantec's website explained how to minimise risks for customers who used pcAnywhere for ...
See all stories on this topic »

BBC News
Sophos Reveals Assessment On Threat Landscape In Security Threat Report 2012
Dark Reading
And the consumerization of IT, sometimes called "bring your own device" or BYOD, became one of the newer causes of data vulnerability. Employees accessed sensitive corporate information from their home computers, smartphones and tablets.
See all stories on this topic »
Race tight in Florida as Romney, Gingrich target each other
Fox News
A two-man fight for Florida is emerging ahead of the state's final Republican presidential debate Thursday, with polls showing the race neck and neck as Mitt Romney and Newt Gingrich pound each other over personal and professional vulnerabilities.
See all stories on this topic »
Core Security Achieves Major Milestones in 2011
Sacramento Bee
In October, Core Security announced and shipped Core WebVerify penetration testing software – based upon Core Impact technology – that provides actionable intelligence and analysis on critical vulnerabilities to reduce exposure to outside threats.
See all stories on this topic »
Chrome Bug Hunters Receive $6000 Payday from Google
Hot Hardware
Arthur Gerkis, for example, was awarded $1000 each for finding a pair of vulnerabilities with a "High" security. Bug hunters rooted out five bugs in all worth a combined $6133.70 in the latest stable release. The biggest payday went to Chamal de Silva, ...
See all stories on this topic »

Hot Hardware


Tip: Use a minus sign (-) in front of terms in your query that you want to exclude. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

Wednesday, January 25, 2012

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
PMQs: Miliband exposes Cameron vulnerabilities
FT.com (blog)
It was no surprise that Ed Miliband led on the economy today, on the day that GDP figures showed a drop in output in the last quarter of last year. The Labour leader's questioning was more effective than usual. He has a new line that looks like it ...
See all stories on this topic »
Intego publishes a 2011 Mac security overview
CNET
by Topher Kessler January 24, 2012 3:09 PM PST The overview summarizes the various malware attempts we've seen on OS X in 2011, but also covers a number of other security vulnerabilities both in OS X and common applications, as well as on social media ...
See all stories on this topic »
Coverity and Wind River Bring Development Testing for Security to Embedded ...
MarketWatch (press release)
--News Highlights -- Coverity and Wind River team to integrate development testing for embedded software security, making it easier and faster to find and fix security vulnerabilities in embedded device software while applications are being written.
See all stories on this topic »
Security threats in M2M comms tackled
GoMo News
Their combined solution enables software developers to build security into the embedded software development process and effectively address security vulnerabilities as software code is written. The two firms involved are Coverity, which specialises in ...
See all stories on this topic »
Google patches several serious Chrome bugs
Computerworld
By Gregg Keizer Computerworld - Google yesterday patched four vulnerabilities in Chrome, and disclosed that it had patched a fifth two weeks ago. The refresh of Chrome 16 was the second security-related update for the browser this month.
See all stories on this topic »
NIST Unveils Continuous Monitoring Draft Guidance
GovInfoSecurity.com
Credit Eligible The National Institute of Standards and Technology is seeking public comment on three interagency reports that provide guidance on the continuous monitoring for security vulnerabilities of information systems. They are: NIST Interagency ...
See all stories on this topic »
Coping with climate change
Gant Daily
In the past five years there have been increased efforts to integrate adaptation and disaster risk reduction as both "aim to reduce the impacts of shocks by anticipating risks and addressing vulnerabilities". IPCC's SREX was an attempt to do that.
See all stories on this topic »
Codenomicon Launches Fuzz-o-Matic Software Security Testing-as-a-Service Platform
MarketWatch (press release)
Codenomicon's security testing platform finds previously-unknown vulnerabilities before hackers do, without false positives or false alarms. For users who already tested software with Static Application Security Testing (SAST), Dynamic Application ...
See all stories on this topic »
Rule-smashing lawyer sees Volcker cracks
Reuters
By Alexandra Alper | WASHINGTON (Reuters) - The controversial ban on banks' proprietary trading known as the Volcker rule has big vulnerabilities and should be reproposed, or face possible legal challenges, a prominent Washington attorney said on ...
See all stories on this topic »
Videoconferencing Can Be The Bug In The Boardroom
Dark Reading
Yet like many products that have not been closely scrutinized by the security community, videoconferencing systems may have a large number of latent vulnerabilities, Talbot says. In 2011, at least 30 vulnerabilities were reported in videoconferencing ...
See all stories on this topic »


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.

Tuesday, January 24, 2012

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
Pwn2Own 2012 Gets Serious About Security Vulnerabilities
eSecurity Planet
The HP-sponsored hacking challenge revises its rules in an effort to expose even more vulnerabilities. By Sean Michael Kerner | January 23, 2012 Over the last several years, the Pwn2Own hacking challenge has become known as the place where browsers get ...
See all stories on this topic »

eSecurity Planet
Leading Analyst Firm Ranks Qualys #1 for Third Consecutive Year in Device ...
MarketWatch (press release)
IDC defines Vulnerability Assessment products as solutions "that scan servers, workstations, other devices and applications to uncover security vulnerabilities be they associated with known security holes (vulnerabilities) contained with a ...
See all stories on this topic »
10K Reasons to Worry About Critical Infrastructure
Wired News
The red tag indicates there are known vulnerabilities for the device that might be exploitable. Two known vulnerabilities are listed at the bottom of the text bubble. MIAMI, Florida – A security researcher was able to locate and map more than 10000 ...
See all stories on this topic »

Wired News
Fluke Networks Releases New Signatures to Protect Against WLAN Vulnerabilities
Sacramento Bee
27, 2011, a serious vulnerability was reported in the WPS mechanism that allows an attacker to derive the PIN and therefore gain unauthorized connection to the access point (AP). There are currently two known attack tools that exploit this ...
See all stories on this topic »
WhiteHat Security Announces Sentinel Baseline Edition Enterprise, Combining ...
MarketWatch (press release)
Additionally, Sentinel BE Enterprise gathers vulnerability data free of false-positives, helping companies establish metrics to measure their security program's success. Companies can now track common vulnerabilities, remediation percentages, ...
See all stories on this topic »
Guardians of the Grid: Agencies Unite to Bulk Up Utility Cybersecurity
CRM Buyer
The focus in the maturity model on analyzing grid vulnerabilities tracks with a December 2011 report from the Massachusetts Institute of Technology (MIT) on the future of the US electrical grid. "From a cybersecurity perspective, interfacing so many ...
See all stories on this topic »
Researchers demonstrate tragic state of SCADA security
Help Net Security
Since the discovery of Stuxnet, we've been hearing from a variety of researchers about security vulnerabilities in SCADA computer systems. While some researchers such as Luigi Auriemma occasionally share with the public entire batches of SCADA flaws ...
See all stories on this topic »

Help Net Security
Just in Time for "Anonymous" Attacks, U.S. NIST Drafts a New Readiness Plan
ReadWriteWeb
By Scott M. Fulton, III / January 23, 2012 5:00 PM / View Comments Two years ago, the US Dept. of Homeland Security firmly decided (again) that a policy of responding to vulnerabilities in the nation's cybersecurity when they happen, is insufficient.
See all stories on this topic »
CanSecWest Pwn2Own hacker challenge gets a $105000 makeover
ZDNet (blog)
By Ryan Naraine | January 23, 2012, 2:29pm PST Summary: HP Zero Day Initiatives revamps the annual hacker contest to put more zero-day vulnerabilities and exploits in play. The annual Pwn2Own hacker challenge is getting a major makeover.
See all stories on this topic »
NopSec Announces Sponsorship of Leading Security Professionals' Convention ...
MarketWatch (press release)
NopSec automates hacking tools to emulate hacker intrusions on small business web applications, mobile applications, and wired and wireless networks, before intruders can take advantage of the detected vulnerabilities.
See all stories on this topic »


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.