Tuesday, January 24, 2012

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
Pwn2Own 2012 Gets Serious About Security Vulnerabilities
eSecurity Planet
The HP-sponsored hacking challenge revises its rules in an effort to expose even more vulnerabilities. By Sean Michael Kerner | January 23, 2012 Over the last several years, the Pwn2Own hacking challenge has become known as the place where browsers get ...
See all stories on this topic »

eSecurity Planet
Leading Analyst Firm Ranks Qualys #1 for Third Consecutive Year in Device ...
MarketWatch (press release)
IDC defines Vulnerability Assessment products as solutions "that scan servers, workstations, other devices and applications to uncover security vulnerabilities be they associated with known security holes (vulnerabilities) contained with a ...
See all stories on this topic »
10K Reasons to Worry About Critical Infrastructure
Wired News
The red tag indicates there are known vulnerabilities for the device that might be exploitable. Two known vulnerabilities are listed at the bottom of the text bubble. MIAMI, Florida – A security researcher was able to locate and map more than 10000 ...
See all stories on this topic »

Wired News
Fluke Networks Releases New Signatures to Protect Against WLAN Vulnerabilities
Sacramento Bee
27, 2011, a serious vulnerability was reported in the WPS mechanism that allows an attacker to derive the PIN and therefore gain unauthorized connection to the access point (AP). There are currently two known attack tools that exploit this ...
See all stories on this topic »
WhiteHat Security Announces Sentinel Baseline Edition Enterprise, Combining ...
MarketWatch (press release)
Additionally, Sentinel BE Enterprise gathers vulnerability data free of false-positives, helping companies establish metrics to measure their security program's success. Companies can now track common vulnerabilities, remediation percentages, ...
See all stories on this topic »
Guardians of the Grid: Agencies Unite to Bulk Up Utility Cybersecurity
CRM Buyer
The focus in the maturity model on analyzing grid vulnerabilities tracks with a December 2011 report from the Massachusetts Institute of Technology (MIT) on the future of the US electrical grid. "From a cybersecurity perspective, interfacing so many ...
See all stories on this topic »
Researchers demonstrate tragic state of SCADA security
Help Net Security
Since the discovery of Stuxnet, we've been hearing from a variety of researchers about security vulnerabilities in SCADA computer systems. While some researchers such as Luigi Auriemma occasionally share with the public entire batches of SCADA flaws ...
See all stories on this topic »

Help Net Security
Just in Time for "Anonymous" Attacks, U.S. NIST Drafts a New Readiness Plan
ReadWriteWeb
By Scott M. Fulton, III / January 23, 2012 5:00 PM / View Comments Two years ago, the US Dept. of Homeland Security firmly decided (again) that a policy of responding to vulnerabilities in the nation's cybersecurity when they happen, is insufficient.
See all stories on this topic »
CanSecWest Pwn2Own hacker challenge gets a $105000 makeover
ZDNet (blog)
By Ryan Naraine | January 23, 2012, 2:29pm PST Summary: HP Zero Day Initiatives revamps the annual hacker contest to put more zero-day vulnerabilities and exploits in play. The annual Pwn2Own hacker challenge is getting a major makeover.
See all stories on this topic »
NopSec Announces Sponsorship of Leading Security Professionals' Convention ...
MarketWatch (press release)
NopSec automates hacking tools to emulate hacker intrusions on small business web applications, mobile applications, and wired and wireless networks, before intruders can take advantage of the detected vulnerabilities.
See all stories on this topic »


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home