Tuesday, January 31, 2012

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
Car-hacking a growing risk with electronics frenzy
The News Journal
"There clearly is a vulnerability," said Adrian Lund, president of the Insurance Institute for Highway Safety, based in Arlington, Va. "All these electronics we're bringing into cars seem to exacerbate that." A National Academy of Sciences panel, ...
See all stories on this topic »
Many pcAnywhere systems still sitting ducks
InfoWorld
Over the weekend, vulnerability management firm Rapid7 scanned for exposed systems running pcAnywhere and found that tens of thousands of installations could likely be attacked through unpatched vulnerabilities in the software because they directly ...
See all stories on this topic »
Info Security Products Guide Eighth Annual 2012 Global Excellence Awards Names ...
EON: Enhanced Online News (press release)
With an ever-growing library of over 50000 checks, Suite360 offers the greatest breadth and depth of coverage for automatically discovering vulnerabilities, applications and services—auditing configuration compliance and monitoring file integrity ...
See all stories on this topic »
Navy Secretary Affirms Clean Energy Plans
Harvard Crimson
"When you run a military organization...you look for vulnerabilities," Mabus said. "Our energy dependence jump[s] out as one of the biggest vulnerabilities we have today." Mabus, who has held office since 2009, has pledged for 50 percent of all ...
See all stories on this topic »
Hackers Infect WordPress 3.2.1 Blogs to Distribute TDSS Rootkit
PCWorld
It's not clear how the websites are being compromised, but there are publicly known exploits for vulnerabilities that affect WordPress 3.2.1, which is an older version of the popular blog publishing platform. Once they gain unauthorized access to a ...
See all stories on this topic »
Breaches, like history, repeat themselves
Network World
The firm found that attackers like to target five relatively common application vulnerabilities: remote file inclusion, SQL injection, local file inclusion, cross site scripting and directory traversal attacks. The majority of these attack vectors have ...
See all stories on this topic »
Del Monte Foods Selects Wombat Security Technologies' Security Training ...
PR Web (press release)
Del Monte is utilizing Wombat's entire Security Training Platform to assess internal vulnerability and to train its workforce to recognize the numerous cyber-attacks launched on organizations every day. "Wombat's Platform enables us to assess internal ...
See all stories on this topic »
A lesson from Lee Atwater
Washington Post (blog)
Romney still has vulnerabilities, and his biggest vulnerability today is an insufficient win tomorrow. If tomorrow is a double-digit win, February looks good for Romney. Anything less than that, and the Romney campaign has some explaining to do.
See all stories on this topic »
Quake fear prompts evaluations of public schools, power utility
Dominican Today
"It has vulnerabilities and has two options to reinforce it: reinforced concrete, and the other a metallic structure. If reinforced it's with reinforced concrete, we would have to build 40cm thick, L shape walls in each corner of the building, ...
See all stories on this topic »
Polls Show Split Opinion On Romney's Business Record
National Journal
The numbers suggest that Romney's work at Bain and his wealth are vulnerabilities, but hardly a silver bullet that will significantly hurt his general election prospects against President Obama. It's useful to think about Romney's vulnerabilities in ...
See all stories on this topic »


This once a day Google Alert is brought to you by Google.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home