Wednesday, February 08, 2012

Google Alert - vulnerabilities

News10 new results for vulnerabilities
 
eEye Releases Retina CS 3.0 Unified Vulnerability Management to Close the ...
MarketWatch (press release)
PHOENIX, AZ, Feb 08, 2012 (MARKETWIRE via COMTEX) -- eEye Digital Security today released Retina CS 3.0, the most recent version of its award-winning vulnerability management solution, to identify and manage threats in public and private cloud ...
See all stories on this topic »
Ballistic Survivability, Lethality and Vulnerability
Cryptome.org
ARL/SLAD conducts SLV analyses, using the MUVES-S2 vulnerability model, to quantify system, subsystem and/or component level vulnerabilities of ground and air vehicles. These analyses are used to support production, design, trade and evaluation ...
See all stories on this topic »
AlertEnterprise Heightens Defense against Cyber Threats and Vulnerabilities ...
EON: Enhanced Online News (press release)
NESCO serves as a focal point to bring together utilities, federal agencies, regulators and researchers to cultivate discussions around countering the toughest vulnerabilities and threats to cyber security. "AlertEnterprise is leveraging its experience ...
See all stories on this topic »
Energy sector to remain vulnerable
DAWN.com
With unresolved structural problems, especially in the energy sector, Pakistan's vulnerabilities had increased, the IMF official noted. Underlining the vulnerabilities, he pointed out: Pakistan's real GDP this year is expected to grow at 3-1/2 per cent ...
See all stories on this topic »

DAWN.com
Solutionary Appoints Rob Kraus as Director of SERT
Sacramento Bee
Augmenting existing research initiatives that actively monitor and assess vulnerabilities, Kraus offers a client centric perspective based on his previous manager role within Solutionary's Security Consulting Services. "Actionable threat intelligence ...
See all stories on this topic »
'Offensive security research community helping bad guys'
ZDNet (blog)
During a keynote presentation at the Kaspersky security analyst summit (see disclosure), Arkin said the intellectual pursuit of exploiting software vulnerabilities and defeating mitigations is simply providing a roadmap for the bad guys to break into ...
See all stories on this topic »
Why is a 14-month-old patched Microsoft vulnerability still being exploited?
Naked Security
They are exciting to report, to research, to block...but interestingly, SophosLabs sees much more malware exploiting patched vulnerabilities. I know - it's a bit weird. Why would malware authors bother to target a vulnerability for which a patch is ...
See all stories on this topic »

Naked Security
Patriot Technologies Launches Reorganized Professional Services Division
MarketWatch (press release)
Patriot's Professional Service offerings include Vulnerability Assessments, Risk Assessments, Penetration Testing, Continuous Monitoring, Security Optimization & Integration, Security Compliance and Security Threat Modeling. In addition, the company ...
See all stories on this topic »
ICS-CERT warns critical infrastructure companies about brute force attacks
Infosecurity Magazine (US)
Researcher Luigi Auriemma has uncovered multiple denial of service (DoS) vulnerabilities in Rockwell Automation's FactoryTalk supervisory control and data acquisition (SCADA) product, the Industrial Control Systems Cyber Emergency Response Team ...
See all stories on this topic »
Adobe Flash Player Protected Mode Beta Released for Firefox
eWeek
If a malicious code tries to take advantage of a vulnerability to escalate privileges or modify existing processes, it is unable to because of the enforced isolation. "For Flash Player, this is the next evolutionary step in protecting our customers," ...
See all stories on this topic »


Tip: Use a minus sign (-) in front of terms in your query that you want to exclude. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

0 Comments:

Post a Comment

<< Home