Monday, February 06, 2012

Google Alert - vulnerabilities

News4 new results for vulnerabilities
 
State of SCADA Security Worries Researchers
eWeek
Researchers examined the state of security in SCADA and industrial control systems and presented an ugly picture of the vulnerabilities and challenges in addressing the issues. CANCUN, Mexico — Recent reports painted a bleak picture of the security ...
See all stories on this topic »
SANS Institute to Host Inaugural Mobile Device Security Summit
Sacramento Bee
6, 2012 -- Top Mobile Security Experts Come Together to Address Some of the Toughest Mobile Security Issues including BYOD, Hacking, Mobile Vulnerabilities and Exploits BETHESDA, Md., Feb. 6, 2012 /PRNewswire-USNewswire/ -- To help InfoSec ...
See all stories on this topic »
Researchers Voice SCADA Concerns
TechWeekEurope UK
McCorkle said a lot of the people he spoke with in the industry had never thought to try fuzzing to look for vulnerabilities in ICS software. File format issues were the most prevalent, followed by ActiveX, according to McCorkle.
See all stories on this topic »

TechWeekEurope UK
A short description about your blog
CIOZone
Security vulnerabilities can result from poor code, functional bugs can be security bugs too, but the trickiest security issues result from code that does more than you expect.. The application may test all of its functional tests but in addition it ...
See all stories on this topic »


Tip: Use quotes ("like this") around a set of words in your query to match them exactly. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home