Google Alert - vulnerabilities
| ||
Windows Media Player vulnerability Infosecurity Magazine (US) Microsoft fixed this vulnerability in its January patch release. M86 describes how an infected web page hosted in South Korea loads a malicious MIDI file. The MIDI file is used to download an executable which is itself a downloader. See all stories on this topic » | ||
Passware Contributes to Mac Forensics by Decrypting FileVault; Warns Consumer ... MarketWatch (press release) Having designed the latest features of Passware Kit Forensic for computer forensics, Passware alerts home users of the vulnerabilities of Mac encryption solutions and advises users to shut down their computers especially when working with confidential ... See all stories on this topic » | ||
| ||
Researchers Postpone Release Of Free Smart Meter Security Testing Tool Dark Reading Don Weber, a senior security analyst with InGuardians, had planned to introduce on Saturday evening a new homegrown tool that tests for both vulnerabilities and functionality in smart grid meters -- via the devices' infrared ports. See all stories on this topic » | ||
Lumension Scan SC Magazine This product can be used to scan the enterprise network and identify assets and seek out vulnerabilities and weaknesses on devices before they can be exploited by an attack. The powerful scanning engine uses information from databases - such as Common ... See all stories on this topic » | ||
eEye Digital Security Retina CS SC Magazine Beyond simple vulnerability scanning, this product also can provide patch management and compliance monitoring. The Retina CS also can be used to scan and assess vulnerabilities in mobile devices and virtualized applications, which provides a full view ... See all stories on this topic » | ||
Foreground Security Named a Finalist in 2012 Info Security's Global Excellence ... MarketWatch (press release) Foreground Security's training programs are based on interactive, real-life scenarios built from the company's experience mitigating known security attacks or vulnerabilities. These scenarios often include live examples, group exercises, war-gaming and ... See all stories on this topic » |
Tip: Use a minus sign (-) in front of terms in your query that you want to exclude. Learn more.
Delete this alert.
Create another alert.
Manage your alerts.
0 Comments:
Post a Comment
<< Home