Tuesday, January 10, 2012

Google Alert - vulnerabilities

News8 new results for vulnerabilities
 
Do you know your cyberthreats?
PC Advisor
The most dangerous consequences occur when this method is used to exploit additional vulnerabilities that may permit an attacker to steal cookies (data exchanged between a web server and a browser), log key strokes, capture screen shots, discover and ...
See all stories on this topic »
ICS-CERT Warns of Security Flaws in Siemens FactoryLink
eSecurity Planet
The US Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued an advisory [PDF file] warning of two vulnerabilities in the Siemens FactoryLink industrial control system software. "Buffer overflow and data corruption ...
See all stories on this topic »
Getting the most out of automated IT security management
GCN.com
SCAP is a NIST specification for expressing and manipulating security data in standardized ways, including implementing security configuration baselines, verifying patches and known vulnerabilities, continuous monitoring of vulnerabilities and security ...
See all stories on this topic »
Protecting Against SQL Injection Attacks with Oracle Database Firewall
eSecurity Planet
Auditing and remediation of exploitable software vulnerabilities is key, but enterprises can also employ additional layers of defenses. Among the ways that enterprises can protect themselves against SQLi attacks is by way of the Oracle Database ...
See all stories on this topic »

eSecurity Planet
Is your online bank vulnerable to currency rounding attacks?
Help Net Security
by Mitja Kolsek - CEO of ACROS Security In the 12+ years of doing penetration tests against various critical environments, we've seen numerous online banking servers and found all sorts of vulnerabilities in them, including bugs that allowed users to ...
See all stories on this topic »

Help Net Security
China's Pipelines in Myanmar
Institute for Defence Studies and Analyses
China's advancement in securing its energy interests in Myanmar has started showing vulnerabilities. In order to meet energy demands in its resource-crunched eastern, southern and central parts, China is constructing oil and gas pipelines in Myanmar, ...
See all stories on this topic »

Institute for Defence Studies and Analyses
SMB Computer Security and Internet Security Awareness Grows
MSPmentor
The "SMB Market Landscape Report 2011," a recent survey of 1000 US- and UK-based SMBs released by internet security software provider AVG, indicates that traditional IT vulnerabilities are still causing SMBs the most concern, but there is a slow ...
See all stories on this topic »
'SD economy uncompetitive, lilangeni overvalued'
The Swazi Observer
In a paper (December 2011) to assess the country's main macroeconomic vulnerabilities and how these affect external stability, analysts Olivier Basdevant, Chikako Baba and Borislava Mircheva note that the key risks Swaziland faces stem from a number of ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home