Google Alert - vulnerabilities
| ||
2012 should bring additional vulnerabilities on foreign exchange funding: Citi Economic Times The year 2012 should bring additional vulnerabilities on foreign exchange funding, according to a report by Citi. India's foreign exchange dependence has risen, given the need to finance its current account deficit and meet debt repayments. ... See all stories on this topic » | ||
MetricStream and Qualys Partnership Brings Actionable Security and Risk ... PR Newswire (press release) The joint solution provides a single robust framework to automatically monitor and capture all asset and network vulnerabilities, and route them through a systematic process of investigation and remediation. This integration enables customers to ... See all stories on this topic » | ||
Skybox Security Announces Risk Control 6.0 MarketWatch (press release) It's critical for IT security professionals to have the right tools to effectively pinpoint security issues and vulnerabilities that can be used to stage an attack," said Gidi Cohen, CEO at Skybox Security. "Skybox Risk Control 6.0 gives valuable ... See all stories on this topic » | ||
Update: Adobe Reader 9.4.7 Patched More Than You Thought Infoboom Admittedly, 2 vulnerabilities is a lot better than 400, as was the case earlier this year with Adobe Flash. Additionally, one known exploitation isn't too bad either. Regardless of the fact that Flash and Reader are separate products, they're both ... See all stories on this topic » | ||
Tips from IT professionals on how to handle virtual desktops, wireless ... Network World "It's part of the contract process," says Alex Jalso, assistant director of information security at WVU, which uses the IBM AppScan Enterprise software vulnerability-assessment tool to analyze and remediate code vulnerabilities and weaknesses. ... See all stories on this topic » | ||
| ||
Apple iOS 5.0.1 hacked, untethered via two security holes ZDNet (blog) By Ryan Naraine | January 3, 2012, 10:10am PST Summary: The 'Corona' jailbreak tool latest exploits a pair of iOS security vulnerabilities to bypass Apple's code-signing requirements. Using two different security vulnerabilities in Apple's flagship ... See all stories on this topic » | ||
McAfee Identifies Threats for Windows 8 in 2012 ASP Free The post added: "Before hearing about this vulnerability, we had planned to release a .NET security update addressing three vulnerabilities, one of which was a Critical elevation-of-privilege vulnerability. When this vulnerability notification arrived ... See all stories on this topic » | ||
| ||
Analysis: HTML5 security holes detailed SC Magazine Australia Many of the vulnerabilities existed only under specific conditions detailed in the paper and Schmidt said readers should not conclude that "HTML5 is completely insecure". In detailing the vulnerabilities, Schmidt wrote that one "fundamental security ... See all stories on this topic » |
Tip: Use site restrict in your query to search within a site (site:nytimes.com or site:.edu). Learn more.
Delete this alert.
Create another alert.
Manage your alerts.
0 Comments:
Post a Comment
<< Home