Google Alert - Vulnerabilities
=== News - 8 new results for [Vulnerabilities] ===
Security vulnerabilities with HTML5 (WebSockets)?
InfoQ.com
Well according to Lori, because WebSockets removes HTTP headers amongst
other things this opens up vulnerabilities that existing virus and malware
checkers require: You know, things like CONTENT-TYPE. You know, the header
that tells the endpoint what ...
<http://www.infoq.com/news/2012/03/websockets-security>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.infoq.com/news/2012/03/websockets-security&hl=en&geo=us>
Study: More than 50% of Global 500 use vulnerable open source components
ZDNet (blog)
By Paula Rooney | March 25, 2012, 10:40pm PDT Summary: A joint study
conducted by Sonatype and Aspect Security found that many open source
components, security libraries and web frameworks contain vulnerabilities,
and that many Fortune 500 companies ...
<http://www.zdnet.com/blog/open-source/study-more-than-50-of-global-500-use-vulnerable-open-source-components/10660>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com/blog/open-source/study-more-than-50-of-global-500-use-vulnerable-open-source-components/10660&hl=en&geo=us>
Internet security better but foul exploits grow, IBM says
CSO
By Michael Cooney March 23, 2012 — Network World — IBM said it found
surprising improvements in Internet security such as a reduction in
application security vulnerabilities, exploit code and spam, but it also
noted that those improvements come with ...
<http://www.csoonline.com/article/702831/internet-security-better-but-foul-exploits-grow-ibm-says>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.csoonline.com/article/702831/internet-security-better-but-foul-exploits-grow-ibm-says&hl=en&geo=us>
Mobile vulnerabilities top IBM report
CRN Australia
By Marcos Colon on Mar 26, 2012 8:22 AM (7 hours ago) The company's X-Force
Trend and Risk Report released this week studied public vulnerability
disclosures from more than 4000 clients last year and found many targeted
mobile platforms.
<http://www.crn.com.au/News/294910,mobile-vulnerabilities-top-ibm-report.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.crn.com.au/News/294910,mobile-vulnerabilities-top-ibm-report.aspx&hl=en&geo=us>
US government pays $250000 for iOS exploit
ZDNet (blog)
Hackers can get paid anywhere between $5000 and $250000 for a security
vulnerability. It's been known for a while that there's a huge market for
buying and selling zero-day exploits in popular software and operating
systems.
<http://www.zdnet.com/blog/security/us-government-pays-250000-for-ios-exploit/11044>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com/blog/security/us-government-pays-250000-for-ios-exploit/11044&hl=en&geo=us>
Scratches on the Surface of SHA256
ITWeb
A closer look at the cryptography in use for digital currency Bitcoin shows
new vulnerabilities in SHA256, says Absa information security researcher
Frans Lategan. Frans Lategan – Absa information security researcher and
speaker at the ITWeb Security ...
<http://www.itweb.co.za/index.php?option=com_content&view=article&id=52906:scratches-on-the-surface-of-sha256>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.itweb.co.za/index.php%3Foption%3Dcom_content%26view%3Darticle%26id%3D52906:scratches-on-the-surface-of-sha256&hl=en&geo=us>
Security fundamentals for embedded software
EE Times
Most security attacks are known to exploit vulnerabilities within
application software. Vulnerabilities are introduced into our embedded
systems during software design and development. Since system-level and
hardware defenses against security attacks ...
<http://www.eetimes.com/design/embedded/4304104/Security-fundamentals-for-embedded-software>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.eetimes.com/design/embedded/4304104/Security-fundamentals-for-embedded-software&hl=en&geo=us>
earthwave and HP deliver first-of-its-kind Security Operations Centre
PRWire
The offering can provide comprehensive security device management,
real-time threat analysis and incident response, reporting, vulnerability
management, threat intelligence, security assurance, regulatory compliance,
and a branded security portal.
<http://prwire.com.au/pr/27960/earthwave-and-hp-deliver-first-of-its-kind-security-operations-centre>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://prwire.com.au/pr/27960/earthwave-and-hp-deliver-first-of-its-kind-security-operations-centre&hl=en&geo=us>
This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg
Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail
Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail
0 Comments:
Post a Comment
<< Home