Saturday, February 04, 2012

Google Alert - vulnerabilities

News8 new results for vulnerabilities
 
Researchers Need to Focus on Defenses, Not Bug Hunting: Adobe
eWeek
CANCUN, Mexico – Security researchers need to shift their attention away from hunting for vulnerabilities and start thinking about ways to make it difficult create exploits, according to a security expert from Adobe. There is too much focus on ...
See all stories on this topic »
Can Glass Box Scanning Find Your Real Bugs?
Dark Reading
The combination promises to find more vulnerabilities, cut down on false alarms, and deliver more relevant information on exploitability, says Patrick Vandenberg, program director for IBM Security. "Independently, white-box and black-box have ...
See all stories on this topic »
Oracle Halts Denial Of Service Threat With Patches
TechWeekEurope UK
The out-of-band patches addressed denial-of-service vulnerabilities that were present in several Oracle products, the company said in a security alert issued 31 January. A remote user would be able to exploit this vulnerability, CVE 2011-5035, ...
See all stories on this topic »

TechWeekEurope UK
Giant opportunities and vulnerabilities
Cape Cod Times (subscription)
Where New York matches up best is with wide receivers Victor Cruz (pictured), Hakeem Nicks and Mario Manningham against a jumbled Patriots secondary. New York's biggest edge is in this area, especially if the Giants can get man coverage on one of those ...
See all stories on this topic »
What Can a Hacker Do with Stolen WiFi Credentials?
Infosecurity Magazine (US) (blog)
Recently HTC acknowledged a vulnerability that can expose a user's WiFi credentials, including the WiFi SSID and security passwords to a malicious app running on some of its Android phones. The vulnerability was discovered by the security architects ...
See all stories on this topic »
HTC admits to not disclosing security bug
TG Daily
It continued, "In those cases, premature disclosure of vulnerabilities could spur creation of malicious apps to take advantage of any vulnerability before it is fixed. For this specific WiFi bug issue, we worked closely with Google and the security ...
See all stories on this topic »
Romney's candidacy viewed as a mixed blessing for LDS church
Daily Herald
Democrats see a formidable opponent with abundant vulnerabilities to exploit. For one group, though, Romney's candidacy represents a unique mix of hopes and fears, pride and apprehension. Leaders of The Church of Jesus Christ of Latter-day Saints have ...
See all stories on this topic »
Passive Network Fingerprinting; p0f Gets Fresh Rewrite
Dark Reading (blog)
Passive network analysis can reveal OS, service, and even vulnerabilities -- just by sniffing the network. By John H. Sawyer In the network security world, nmap is the king for fingerprinting systems and services over the network.
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home