Wednesday, January 04, 2012

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
2012 should bring additional vulnerabilities on foreign exchange funding: Citi
Economic Times
The year 2012 should bring additional vulnerabilities on foreign exchange funding, according to a report by Citi. India's foreign exchange dependence has risen, given the need to finance its current account deficit and meet debt repayments. ...
See all stories on this topic »
MetricStream and Qualys Partnership Brings Actionable Security and Risk ...
PR Newswire (press release)
The joint solution provides a single robust framework to automatically monitor and capture all asset and network vulnerabilities, and route them through a systematic process of investigation and remediation. This integration enables customers to ...
See all stories on this topic »
Skybox Security Announces Risk Control 6.0
MarketWatch (press release)
It's critical for IT security professionals to have the right tools to effectively pinpoint security issues and vulnerabilities that can be used to stage an attack," said Gidi Cohen, CEO at Skybox Security. "Skybox Risk Control 6.0 gives valuable ...
See all stories on this topic »
Update: Adobe Reader 9.4.7 Patched More Than You Thought
Infoboom
Admittedly, 2 vulnerabilities is a lot better than 400, as was the case earlier this year with Adobe Flash. Additionally, one known exploitation isn't too bad either. Regardless of the fact that Flash and Reader are separate products, they're both ...
See all stories on this topic »
Tips from IT professionals on how to handle virtual desktops, wireless ...
Network World
"It's part of the contract process," says Alex Jalso, assistant director of information security at WVU, which uses the IBM AppScan Enterprise software vulnerability-assessment tool to analyze and remediate code vulnerabilities and weaknesses. ...
See all stories on this topic »
Exploit of Wi-Fi Protected Setup Flaw Poses Risks for Consumers, Not Enterprises
eSecurity Planet
"Vulnerabilities in the Wi-Fi Protected Setup (WPS) protocol that allow attackers to recover WPA/WPA2 passphrases have existed for over one year now," Tom Kellermann, CTO of Wi-Fi security vendor Air Patrol told InternetNews.com. ...
See all stories on this topic »

eSecurity Planet
Apple iOS 5.0.1 hacked, untethered via two security holes
ZDNet (blog)
By Ryan Naraine | January 3, 2012, 10:10am PST Summary: The 'Corona' jailbreak tool latest exploits a pair of iOS security vulnerabilities to bypass Apple's code-signing requirements. Using two different security vulnerabilities in Apple's flagship ...
See all stories on this topic »
McAfee Identifies Threats for Windows 8 in 2012
ASP Free
The post added: "Before hearing about this vulnerability, we had planned to release a .NET security update addressing three vulnerabilities, one of which was a Critical elevation-of-privilege vulnerability. When this vulnerability notification arrived ...
See all stories on this topic »
Mark Halperin: Press not rooting for Mitt Romney
Politico
"One of the vulnerabilities Mitt Romney has is the press has not been rooting for him the way the press was rooting for George Bush in '99, for McCain later on in that campaign, so that's left him vulnerable," Halperin said on MSNBC's "Morning Joe. ...
See all stories on this topic »

Politico
Analysis: HTML5 security holes detailed
SC Magazine Australia
Many of the vulnerabilities existed only under specific conditions detailed in the paper and Schmidt said readers should not conclude that "HTML5 is completely insecure". In detailing the vulnerabilities, Schmidt wrote that one "fundamental security ...
See all stories on this topic »


Tip: Use site restrict in your query to search within a site (site:nytimes.com or site:.edu). Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home