Thursday, May 31, 2012

Google Alert - Vulnerabilities

=== News - 10 new results for [Vulnerabilities] ===

The Vulnerabilities Market and the Future of Security
Forbes
Recently, there have been several articles about the new market in zero-day
exploits: new and unpatched computer vulnerabilities. It's not just
software companies, who sometimes pay bounties to researchers who alert
them of security vulnerabilities so ...
<http://www.forbes.com/sites/bruceschneier/2012/05/30/the-vulnerabilities-market-and-the-future-of-security/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.forbes.com/sites/bruceschneier/2012/05/30/the-vulnerabilities-market-and-the-future-of-security/&hl=en&geo=us>

Tenable Network Security Announces Malware Detection for Nessus
Vulnerability ...
MarketWatch (press release)
COLUMBIA, Md., May 30, 2012 (BUSINESS WIRE) -- Tenable Network Security,
Inc., the leader in Unified Security Monitoring (USM), today announced new
malicious process detection capabilities on Windows computers for the
Nessus(R) vulnerability scanner.
<http://www.marketwatch.com/story/tenable-network-security-announces-malware-detection-for-nessus-vulnerability-scanner-2012-05-30>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/tenable-network-security-announces-malware-detection-for-nessus-vulnerability-scanner-2012-05-30&hl=en&geo=us>

FireMon Delivers Industry-First Complete Security Posture Management --
From ...
MarketWatch (press release)
This gives enterprises, government agencies and managed security service
providers (MSSPs) unparalleled visibility to understand the scope of
business vulnerability and prioritize the proactive defense of critical
assets, while maintaining a high ...
<http://www.marketwatch.com/story/firemon-delivers-industry-first-complete-security-posture-management-from-risk-analysis-through-remediation-2012-05-30>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/firemon-delivers-industry-first-complete-security-posture-management-from-risk-analysis-through-remediation-2012-05-30&hl=en&geo=us>

Juniper's Mykonos Business Unit Offers Web Security Enhancements
CRN
"We respond to them by inundating the scanner with fake data that says
yes to every potential vulnerability, thereby making the scan useless
because the vulnerabilities are not there in real life. If the hacker has
to go through 10000 reported ...
<http://www.crn.com/news/security/240001242/juniper-8217-s-mykonos-business-unit-offers-web-security-enhancements.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.crn.com/news/security/240001242/juniper-8217-s-mykonos-business-unit-offers-web-security-enhancements.htm&hl=en&geo=us>

Humboldt Bay's Climate Change Vulnerabilities Detailed Tonight – May 30,
2012
Arcata Eye
SOUTH G STREET – In honor of Wetlands Month, the Arcata Marsh
Interpretive Center presents a talk by Aldaron Laird, the only person to
have walked or kayaked all 102 miles of Humboldt Bay's shoreline and
sloughs. Laird, an environmental planner, ...
<http://www.arcataeye.com/2012/05/humboldt-bays-climate-change-vulerabilities-detailed-tonight/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.arcataeye.com/2012/05/humboldt-bays-climate-change-vulerabilities-detailed-tonight/&hl=en&geo=us>

Juniper packs 30 new features into Web security software
Network World
The software then dupes attackers by presenting false vulnerabilities to
keep them around so it can learn as much about them as possible to prevent
future attacks. This technique uses attackers' actions against them by
wasting their time on false ...
<http://www.networkworld.com/news/2012/053012-juniper-intrusion-deception-259690.html?hpg1=bn>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.networkworld.com/news/2012/053012-juniper-intrusion-deception-259690.html%3Fhpg1%3Dbn&hl=en&geo=us>

Mykonos looks to thwart hacker intelligence with Web Security Software
V3.co.uk
Other new features include protections against third-party software
vulnerabilities and the addition of support for appliance clusters which
will allow firms to bypass the previous 1Gbit thoughput limit. The release
marks the first major update from ...
<http://www.v3.co.uk/v3-uk/news/2181106/mykonos-looks-thwart-hacker-intelligence-web-security-software>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.v3.co.uk/v3-uk/news/2181106/mykonos-looks-thwart-hacker-intelligence-web-security-software&hl=en&geo=us>

Juniper Networks Releases New Mykonos Security Software to Stop Web Attacks
MarketWatch (press release)
Once attackers are identified, Mykonos Web Security prevents them from
compromising critical information, wastes their time by presenting false
vulnerabilities and provides valuable intelligence to thwart future
attacks. This active, intelligence-based ...
<http://www.marketwatch.com/story/juniper-networks-releases-new-mykonos-security-software-to-stop-web-attacks-2012-05-30>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/juniper-networks-releases-new-mykonos-security-software-to-stop-web-attacks-2012-05-30&hl=en&geo=us>

Nuclear plant operators haven't reassessed quake risk
The Bay Citizen
By Daniel J. Goldstein on May 30, 2012 - 12:06 pm PDT PG&E and Southern
California Edison, operators of California's two nuclear power reactors,
haven't done a comprehensive risk assessment of their plants'
vulnerabilities to earthquakes for nearly two ...
<http://www.baycitizen.org/energy/story/nuclear-plant-operators-havent-quake/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.baycitizen.org/energy/story/nuclear-plant-operators-havent-quake/&hl=en&geo=us>

Metta World Peace becomes 'Metta Man'
Los Angeles Times
And most importantly, World Peace talks openly about his vulnerabilities
with mental health issues in hopes that it helps others. Yes, World Peace
occasionally stumbles. His vicious elbow to Oklahoma City guard James
Harden earned him a seven-game ...
<http://www.latimes.com/sports/lakersnow/la-sp-ln-a-metta-world-peace-becomes-metta-man-20120530,0,6842956.story?track=rss>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.latimes.com/sports/lakersnow/la-sp-ln-a-metta-world-peace-becomes-metta-man-20120530,0,6842956.story%3Ftrack%3Drss&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Wednesday, May 30, 2012

Google Alert - Vulnerabilities

=== News - 8 new results for [Vulnerabilities] ===

Bug bounty hunters reveal eight vulnerabilities in Google services
CSO Magazine
Due to incorrect information provided by the source, the 11th paragraph of
the story "Bug bounty hunters reveal eight vulnerabilities in Google
services," posted Thursday, overstated the consequences of the discovery of
the bugs.
<http://www.cso.com.au/article/426066/bug_bounty_hunters_reveal_eight_vulnerabilities_google_services/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.cso.com.au/article/426066/bug_bounty_hunters_reveal_eight_vulnerabilities_google_services/&hl=en&geo=us>

IT organizations want better visibility into their network in order to
react ...
Dark Reading
Among the key tools they are looking to add this year are database
monitoring, SIEM, and vulnerability assessment tools, the report found.
More than 60 percent say they have the same visibility into their network
that they had in 2010, while 27 percent ...
<http://www.darkreading.com/compliance/167901112/security/vulnerabilities/240001161/database-monitoring-siem-top-it-s-list.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/compliance/167901112/security/vulnerabilities/240001161/database-monitoring-siem-top-it-s-list.html&hl=en&geo=us>

Speakers stress protection of older people's rights
Pakistan Daily Times
ISLAMABAD: Speakers at a seminar said that given the old age
vulnerabilities, it is high time for the government to introduce national
social protection floor that integrates income security needs of the older
people. They said this during a national ...
<http://www.dailytimes.com.pk/default.asp?page=2012%5C05%5C30%5Cstory_30-5-2012_pg7_18>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.dailytimes.com.pk/default.asp%3Fpage%3D2012%255C05%255C30%255Cstory_30-5-2012_pg7_18&hl=en&geo=us>

AT&T: What Connection Hijacking And New Data Plans Mean For The Stock
Seeking Alpha
AT&T (T), as well as at least 47 other carriers, were recently identified
as having vulnerabilities that leave them open to hijacking. The
vulnerability that has been identified by computer scientists allows
"attackers to surreptitiously hijack the ...
<http://seekingalpha.com/article/623321-at-t-what-connection-hijacking-and-new-data-plans-mean-for-the-stock>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://seekingalpha.com/article/623321-at-t-what-connection-hijacking-and-new-data-plans-mean-for-the-stock&hl=en&geo=us>

MerlinCryption Introduces Powerful M2M Cryptosystem to Overcome Security ...
PR Web (press release)
... MerlinCryption's dynamic M2M encryption platform protects telemetry
information, command and control, status and position, and stakeholder
investments against the risks of satellite-based communication and
vulnerabilities of space assets.
<http://www.prweb.com/releases/2012/5/prweb9555174.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.prweb.com/releases/2012/5/prweb9555174.htm&hl=en&geo=us>

Report: Nuclear plant operators haven't reassessed quake risk
California Watch
PG&E and Southern California Edison, operators of California's two nuclear
power reactors, haven't done a comprehensive risk assessment of their
plants' vulnerabilities to earthquakes for nearly two decades, according to
a Government Accountability ...
<http://californiawatch.org/dailyreport/report-nuclear-plant-operators-havent-reassessed-quake-risk-16380>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://californiawatch.org/dailyreport/report-nuclear-plant-operators-havent-reassessed-quake-risk-16380&hl=en&geo=us>

Health, Environment And Safety Conference And Exhibition
Ghana
According to Vulnerability Assessment Studies carried out by the
Environmental Protection Agency (EPA), most sensitive sectors of the
economy such as agriculture, forestry, fisheries, water resources, energy
production, health, and tourism, ...
<http://www.ghana.gov.gh/index.php/news/features/13267-health-environment-and-safety-conference-and-exhibition>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.ghana.gov.gh/index.php/news/features/13267-health-environment-and-safety-conference-and-exhibition&hl=en&geo=us>

Mission Critical: Have You Tested Your DR Plan Lately?
CTR
With the industry concerns such as security, compliances, standards and
vulnerabilities, it is extremely important to implement a structured
disaster recovery plan to support their IT infrastructure. As Information
Technology hits prime time and ...
<http://www.wwpi.com/index.php?option=com_content&view=article&id=14694:mission-critical-have-you-tested-your-dr-plan-lately&catid=328:ctr-exclusives&Itemid=2701746>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.wwpi.com/index.php%3Foption%3Dcom_content%26view%3Darticle%26id%3D14694:mission-critical-have-you-tested-your-dr-plan-lately%26catid%3D328:ctr-exclusives%26Itemid%3D2701746&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Tuesday, May 29, 2012

Google Alert - Vulnerabilities

=== News - 4 new results for [Vulnerabilities] ===

Patch management still big stumbling block in risk management, survey shows
Network World
"Before the advent of numerous regulations and the rise of malicious code
targeting known vulnerabilities, patch management was not a top issue for
many organizations," states the McAfee report. "Today, patch management
must be a top priority to ...
<http://www.networkworld.com/news/2012/052912-mcafee-risk-management-259630.html?hpg1=bn>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.networkworld.com/news/2012/052912-mcafee-risk-management-259630.html%3Fhpg1%3Dbn&hl=en&geo=us>

McAfee Risk and Compliance Outlook Report Finds SIEM and Database Security
Are ...
MarketWatch (press release)
Just like last year's analysis, not all companies are able to pinpoint
threats or vulnerabilities, as a result, 43% indicate that they
over-protect and patch everything they can. "Managing risk through security
and compliance continues to be a leading ...
<http://www.marketwatch.com/story/mcafee-risk-and-compliance-outlook-report-finds-siem-and-database-security-are-top-priorities-2012-05-29>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/mcafee-risk-and-compliance-outlook-report-finds-siem-and-database-security-are-top-priorities-2012-05-29&hl=en&geo=us>

Meet "Flame", The Massive Spy Malware Infiltrating Iranian Computers
Wired News
Also, like Stuxnet, Flame has the ability to spread by infecting USB sticks
using the autorun and .lnk vulnerabilities that Stuxnet used. It also uses
the same print spooler vulnerability that Stuxnet used to spread to
computers on a local network.
<http://www.wired.com/threatlevel/2012/05/flame/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.wired.com/threatlevel/2012/05/flame/&hl=en&geo=us>

Qualifying a "Cyber Arms Race"
SYS-CON Media (press release) (blog)
Vulnerabilities must pre-exist, they cannot be created. The weapon uses the
system itself to create the destructive effect. At a banal level, there are
tons of existing vulnerabilities, but when we get to those that matter the
opportunities lessen ...
<http://www.sys-con.com/node/2285518>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sys-con.com/node/2285518&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Monday, May 28, 2012

Google Alert - Vulnerabilities

=== News - 2 new results for [Vulnerabilities] ===

Living full life means facing risk of vulnerability
Las Vegas Review-Journal
A patient asks if I've heard sociologist/researcher Brene Brown's talk "The
Power of Vulnerability." No, I haven't. So, I go home and do. Hey, Good
Reader: Have you heard sociologist/researcher Brene Brown's talk "The Power
of Vulnerability"? No?
<http://www.lvrj.com/living/living-full-life-means-facing-risk-of-vulnerability-154689515.html?ref=515>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.lvrj.com/living/living-full-life-means-facing-risk-of-vulnerability-154689515.html%3Fref%3D515&hl=en&geo=us>

Safety fears grow at Japan nuclear plant
Financial Times
Six months on, fresh safety concerns, focused on what some experts say are
vulnerabilities in a pool housing spent uranium fuel, has put the
government and Tokyo Electric Power (Tepco), the plant's owner, on the
defensive. It is also highlighting the ...
<http://www.ft.com/cms/s/0/5209a89e-a7eb-11e1-b8a9-00144feabdc0.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.ft.com/cms/s/0/5209a89e-a7eb-11e1-b8a9-00144feabdc0.html&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Sunday, May 27, 2012

Google Alert - Vulnerabilities

=== News - 3 new results for [Vulnerabilities] ===

International collaboration brings you insider perspectives on global
cyber ...
Malta Independent Online
Not surprisingly, this made it possible for any malicious actor on the
Internet to trivially exploit cyber vulnerabilities which should have been
avoidable. Predictably, this "Total Information Awareness" style policy
has caused untold financial and ...
<http://www.independent.com.mt/news.asp?newsitemid=144956>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.independent.com.mt/news.asp%3Fnewsitemid%3D144956&hl=en&geo=us>

Apple iOS Needs Antivirus Protection: Kaspersky
eWeek
They and security experts from other organizations chastised Apple for the
two-month delay between the time Oracle issued a patch in February for
Windows and other systems for the Java vulnerability exploited by Flashback
and when Apple issued its own ...
<http://www.eweek.com/c/a/Security/Apple-iOS-Needs-Antivirus-Protection-Kaspersky-844659/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.eweek.com/c/a/Security/Apple-iOS-Needs-Antivirus-Protection-Kaspersky-844659/&hl=en&geo=us>

Crime groups rife at ports, inquiry finds
Harden Murrumburrah Express
AUSTRALIA'S border security is exposed to 19 ''critical'' risks and dozens
of other serious vulnerabilities, which are wrecking efforts to control an
epidemic of drugs and arms smuggling on the waterfront. A federal and state
police taskforce has ...
<http://www.hardenexpress.com.au/news/national/national/general/crime-groups-rife-at-ports-inquiry-finds/2568597.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.hardenexpress.com.au/news/national/national/general/crime-groups-rife-at-ports-inquiry-finds/2568597.aspx&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Saturday, May 26, 2012

Google Alert - Vulnerabilities

=== News - 7 new results for [Vulnerabilities] ===

Looking At Android's Vulnerabilities
Macgasm
Pointing out fragmentation and issues with OS adoption is no new revelation
for critics, but those two issues remain very serious vulnerabilities and
bear repeating. One need only look at the rise of Windows in the 90s:
Cheaper than the Mac and ...
<http://www.macgasm.net/2012/05/25/looking-at-androids-vulnerabilities/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.macgasm.net/2012/05/25/looking-at-androids-vulnerabilities/&hl=en&geo=us>

Preparing for the worst
Daily Comet
Creating a family disaster plan based on your vulnerabilities and the
actions you should take, may reduce the effects of a disaster. - Discuss
the type of hazards that could affect your family. Know your home's
vulnerability to storm surge, ...
<http://www.dailycomet.com/article/20120525/WEATHER02/120529774?Title=Preparing-for-the-worst>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.dailycomet.com/article/20120525/WEATHER02/120529774%3FTitle%3DPreparing-for-the-worst&hl=en&geo=us>

[Exclusive] How To Root The AT&T HTC One X On Version 1.85 (Or Earlier)
Android Police
While giving the AT&T HTC One X's firmware a look over, I ran across aa
vulnerability that would allow us to gain root access. It turned out not to
be all that useful at the time, as another root was released the same day.
With the latest 1.85 firmware ...
<http://www.androidpolice.com/2012/05/25/exclusive-how-to-root-the-att-htc-one-x-on-version-1-85-or-earlier/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.androidpolice.com/2012/05/25/exclusive-how-to-root-the-att-htc-one-x-on-version-1-85-or-earlier/&hl=en&geo=us>

Nation's border security corruption
BigPond News
Australia's border security is exposed to serious vulnerabilities which are
allowing smuggling at its ports. Australia's border security is exposed to
serious vulnerabilities and risk areas, which are allowing drugs and arms
smuggling at its ports.
<http://bigpondnews.com/articles/National/2012/05/26/Nations_border_security_corruption_754106.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://bigpondnews.com/articles/National/2012/05/26/Nations_border_security_corruption_754106.html&hl=en&geo=us>

Govt crime crackdown focuses on waterfront
New Zealand Herald
"Transnational threats could arise from a more intense interaction between
organised criminal networks and terrorist, insurgent or extremist groups
who often exploit similar sector vulnerabilities, including those found
within the security and ...
<http://www.nzherald.co.nz/world/news/article.cfm?c_id=2&objectid=10808573>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.nzherald.co.nz/world/news/article.cfm%3Fc_id%3D2%26objectid%3D10808573&hl=en&geo=us>

The Oil and the Glory: The Weekly Wrap -- May 25, 2012
Foreign Policy (blog)
I drew up with a short list of names, along with possible vulnerabilities
for use as leverage. How about you -- what problematic situation could you
see shaken up? Vulnerabilities: Napoleon complex. Urge to strip publicly to
his waist.
<http://oilandglory.foreignpolicy.com/posts/2012/05/25/the_weekly_wrap_may_25_2012>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://oilandglory.foreignpolicy.com/posts/2012/05/25/the_weekly_wrap_may_25_2012&hl=en&geo=us>

TEXT-S&P affirms Romania's ratings at 'BB+/B'
Reuters
Rationale The ratings on Romania are constrained by low prosperity and the
economy's vulnerability to external shocks owing to still-high, albeit
declining, external debt and dominant ownership of the banking sector by
Austrian and Greek parent banks.
<http://www.reuters.com/article/2012/05/25/idUSWNA816820120525>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.reuters.com/article/2012/05/25/idUSWNA816820120525&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Friday, May 25, 2012

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Bug Bounty Hunters Reveal Eight Vulnerabilities in Google Services
PCWorld
By Loek Essers, IDG-News-Service:Amsterdam-Bureau Security researchers
unveiled eight vulnerabilities in Google services during the Hack in the
Box conference in Amsterdam on Thursday -- but they claim to have
discovered more than 100 such bugs over ...
<http://www.pcworld.com/businesscenter/article/256151/bug_bounty_hunters_reveal_eight_vulnerabilities_in_google_services.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/256151/bug_bounty_hunters_reveal_eight_vulnerabilities_in_google_services.html&hl=en&geo=us>

Foxit(R) Reader Continues to Keep Users Safe From Security Vulnerabilities
MarketWatch (press release)
These security flaws are reported to the industry and are identified by
their Common Vulnerabilities and Exposures (CVE) numbers. Recently reported
CVE numbers include CVE-2012-0774, CVE-2012-0775, CVE-2012-0776, and
CVE-2012-0777.
<http://www.marketwatch.com/story/foxitr-reader-continues-to-keep-users-safe-from-security-vulnerabilities-2012-05-24>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/foxitr-reader-continues-to-keep-users-safe-from-security-vulnerabilities-2012-05-24&hl=en&geo=us>

Pwnium Chrome hackers exploited 16 zero-day vulnerabilities
Techworld.com
By Gregg Keizer | Computerworld US | Published: 11:37, 24 May 2012 Google
Chrome hackers used a total of 16 zero-day vulnerabilities to crack the
browser at the inaugural "Pwnium" hacking contest and win $120000. The
number of bugs the two researchers ...
<http://news.techworld.com/security/3359722/pwnium-chrome-hackers-exploited-16-zero-day-vulnerabilities/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://news.techworld.com/security/3359722/pwnium-chrome-hackers-exploited-16-zero-day-vulnerabilities/&hl=en&geo=us>

Homeland Security zeroes in on medical device vulnerabilities
Healthcare IT News
WASHINGTON – Even as they promise better health and easier care delivery,
wireless medical devices (MDs) carry significant security risks. And the
situation is only getting trickier as more and more devices come with
commercial operating systems that ...
<http://www.healthcareitnews.com/news/homeland-security-zeroes-medical-device-vulnerabilities>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.healthcareitnews.com/news/homeland-security-zeroes-medical-device-vulnerabilities&hl=en&geo=us>

Biometric bugs too dangerous for public?
ZDNet Australia
Vulnerabilities in biometric systems are too dangerous to allow the general
public to point out, according to Biometrics Institute technical committee
chair Ted Dunstone — and they should not be encouraged to try. Speaking
to ZDNet Australia and ...
<http://www.zdnet.com.au/biometric-bugs-too-dangerous-for-public-339338607.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com.au/biometric-bugs-too-dangerous-for-public-339338607.htm&hl=en&geo=us>

Patch as Patch Can: All Software Is Flawed
SYS-CON Media (press release)
Across all industries and platforms, the Window of Exploit (WOE) - that is,
the time lag between announced discovery and the availability of a patch -
for web-based vulnerabilities is a whopping 233 days, according to WhiteHat
Security.
<http://www.sys-con.com/node/2284509>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sys-con.com/node/2284509&hl=en&geo=us>

Text or Talk: Is Technology Making You Lonely?
Forbes
Or at least not enough to avoid us feeling increasingly alone. As I wrote
in Find Your Courage, human beings crave intimacy. Neurobiologists have
found we are wired for it. Yet genuine intimacy demands vulnerability and
vulnerability requires courage.
<http://www.forbes.com/sites/womensmedia/2012/05/24/text-or-talk-is-technology-making-you-lonely/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.forbes.com/sites/womensmedia/2012/05/24/text-or-talk-is-technology-making-you-lonely/&hl=en&geo=us>

Establishing a Strategy for Database Security is No Longer Optional
InfoWorld
The report identifies best practices, including: Implementing database
activity monitoring to mitigate the high levels of risk from database
vulnerabilities, and address audit findings in areas such as database
segregation of duties and change ...
<http://www.infoworld.com/d/wp/establishing-strategy-database-security-no-longer-optional-194120>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.infoworld.com/d/wp/establishing-strategy-database-security-no-longer-optional-194120&hl=en&geo=us>

Database Activity Monitoring Is Evolving
CIO
Organizations are increasingly concerned with optimizing database security
and mitigating risks associated with database vulnerabilities. And, the
need to meet compliance requirements is pressuring organizations to adopt
more aggressive and expansive ...
<http://www.cio.com/white-paper/706994/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.cio.com/white-paper/706994/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Thursday, May 24, 2012

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

NBC/WSJ poll highlights Obama's economic vulnerabilities
msnbc.com (blog)
By Michael O'Brien, msnbc.com President Barack Obama's most glaring
vulnerabilities this election cycle are laid bare in the new NBC News/Wall
Street Journal poll, in which Americans say the incumbent commander in
chief has either made no impact on ...
<http://nbcpolitics.msnbc.msn.com/_news/2012/05/23/11832364-nbcwsj-poll-highlights-obamas-economic-vulnerabilities?lite>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://nbcpolitics.msnbc.msn.com/_news/2012/05/23/11832364-nbcwsj-poll-highlights-obamas-economic-vulnerabilities%3Flite&hl=en&geo=us>

Pwnium hacking contest winners exploited 16 Chrome zero-days
Computerworld
By Gregg Keizer Computerworld - Google yesterday revealed that the two
researchers who cracked Chrome in March at the company's inaugural "Pwnium"
hacking contest used a total of 16 zero-day vulnerabilities to win $60000
each.
<http://www.computerworld.com/s/article/9227404/Pwnium_hacking_contest_winners_exploited_16_Chrome_zero_days?source=rss_keyword_edpicks>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.computerworld.com/s/article/9227404/Pwnium_hacking_contest_winners_exploited_16_Chrome_zero_days%3Fsource%3Drss_keyword_edpicks&hl=en&geo=us>

'Pakistan among 20 vulnerable countries affected by climate change'
The News International
ISLAMABAD: Pakistan has been ranked amongst the 20 vulnerable countries,
impacted by climate change, according to Maple Craft Climate Change
Vulnerabilities Index. An official of the Ministry for Climate Change told
APP that different steps are being ...
<http://www.thenews.com.pk/Todays-News-2-110198-Pakistan-among-20-vulnerable-countries-affected-by-climate-change>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.thenews.com.pk/Todays-News-2-110198-Pakistan-among-20-vulnerable-countries-affected-by-climate-change&hl=en&geo=us>

Imperva Report Examines Dangers Of User-Generated Content In Light Of
Military ...
Reuters
Karr@lewispulse.com Dissecting a Hacktivist Attack Deconstructs Recent
Social Network Breach, Highlights Vulnerabilities and Provides
Recommendations for Remediation Redwood Shores, Calif., May 23, 2012 -
Imperva, Inc. (NYSE: IMPV), a pioneer and ...
<http://www.reuters.com/article/2012/05/23/idUS69875+23-May-2012+HUG20120523>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.reuters.com/article/2012/05/23/idUS69875%2B23-May-2012%2BHUG20120523&hl=en&geo=us>

United Airlines reportedly spills passenger information
Ars Technica
by Dan Goodin - May 24, 2012 12:07 am UTC An engineer for a company that
scans websites for security vulnerabilities recently got a new perspective
on the dangers of Web application bugs. While trying to purchase airline
tickets from United.com, ...
<http://arstechnica.com/security/2012/05/united-airlines-reportedly-spills-passenger-information/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://arstechnica.com/security/2012/05/united-airlines-reportedly-spills-passenger-information/&hl=en&geo=us>

Federal report warns of costly impacts to US cities from changing weather
extremes
Climate Science Watch
The analysis, Climate Change and Infrastructure, Urban Systems, and
Vulnerabilities [PDF] (February 29, 2012) is a report to the US Department
of Energy in support of the National Climate Assessment. "For this study,
the emphasis is on built ...
<http://www.climatesciencewatch.org/2012/05/23/federal-report-warns-of-costly-impacts-to-us-cities-from-changing-weather-extremes/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.climatesciencewatch.org/2012/05/23/federal-report-warns-of-costly-impacts-to-us-cities-from-changing-weather-extremes/&hl=en&geo=us>

Researchers Say They Snuck Malware App Past Google's 'Bouncer' Android
Market ...
Forbes
That's the claim, at least, of a pair of researchers from the cybersecurity
consultancy Trustwave who plan to present security vulnerabilities they say
they've discovered in Google's mobile platform at the Black Hat security
conference in July.
<http://www.forbes.com/sites/andygreenberg/2012/05/23/researchers-say-they-snuck-malware-app-past-googles-bouncer-android-market-scanner/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.forbes.com/sites/andygreenberg/2012/05/23/researchers-say-they-snuck-malware-app-past-googles-bouncer-android-market-scanner/&hl=en&geo=us>

FEC to release previously secret documents - Get ready for political
football ...
Politico
OBAMA AND ROMNEY CAMPAIGNS SHOWING FUNDRAISING VULNERABILITIES: Both the
presidential campaigns of Barack Obama and Mitt Romney are showing signs of
fundraising vulnerabilities — but for different reasons, according to a
new study out today by the ...
<http://www.politico.com/politicoinfluence/0512/politicoinfluence268.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.politico.com/politicoinfluence/0512/politicoinfluence268.html&hl=en&geo=us>

AM Vitals: Anticipating the Health Law Ruling
Wall Street Journal (blog)
Stryker CEO Sought Nod for Romance (WSJ): The tale of how the CEO of
medical-device maker Stryker lost his job underscores how, in the rough and
tumble world of boardroom politics, workplace romances can create
vulnerabilities that prove hard to manage ...
<http://blogs.wsj.com/health/2012/05/23/a-m-vitals-anticipating-the-health-law-ruling/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://blogs.wsj.com/health/2012/05/23/a-m-vitals-anticipating-the-health-law-ruling/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Wednesday, May 23, 2012

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Security vulnerability reporting framework upgraded for reserchers
IDG News Service
The security industry's Common Vulnerability Reporting Framework (CVRF)
framework for reporting and sharing security vulnerabilities in a
machine-readable format has been given a promised revamp to make it easier
to use for third-party researchers.
<http://news.idg.no/cw/art.cfm?id=8F3E868A-FDC6-197D-E9434D370F0E8A2F>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://news.idg.no/cw/art.cfm%3Fid%3D8F3E868A-FDC6-197D-E9434D370F0E8A2F&hl=en&geo=us>

Indian SMBs facing advanced attack threats
Register
Interestingly, while the total number of attacks jumped by 81 per cent,
with more than 5.5 billion blocked in the region last year, the number of
new vulnerabilities discovered dropped by 20 per cent. According to
Symantec, this is a clear sign that ...
<http://www.theregister.co.uk/2012/05/23/symantec_india_smb_threats/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.theregister.co.uk/2012/05/23/symantec_india_smb_threats/&hl=en&geo=us>

Top 10 patching hurdles and how to overcome them
Help Net Security
It may not protect against advance attacks that make use of 0-day
vulnerabilities, but for the most part it is an excellent cost effective
and reliable solution. But many organizations have a hard time patching.
This made me want to examine: what ...
<http://www.net-security.org/article.php?id=1714>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.net-security.org/article.php%3Fid%3D1714&hl=en&geo=us>

Al Qaeda Video Calls for 'Electronic Jihad'
ABC News
In a chilling video, an al Qaeda operative calls for "electronic jihad"
against the United States, and compares vulnerabilities in vital American
computer networks to the flaws in aviation security before the 9/11 attack.
The al Qaeda video calls upon ...
<http://abcnews.go.com/Politics/cyber-terrorism-al-qaeda-video-calls-electronic-jihad/story?id=16407875>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://abcnews.go.com/Politics/cyber-terrorism-al-qaeda-video-calls-electronic-jihad/story%3Fid%3D16407875&hl=en&geo=us>

Triple C will offer GamaSec online Website Scan security services
WebWire (press release)
GamaSec provides the industry-leading cloud-based (SaaS) solution for
identifying web site and web application vulnerabilities will be offered to
Triple C cloud Israeli customers in exclusivity. GamaSec (www.gamasec.com)
a cloud computing SaaS online ...
<http://www.webwire.com/ViewPressRel.asp?aId=156812>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.webwire.com/ViewPressRel.asp%3FaId%3D156812&hl=en&geo=us>

Internet attacks target small cities, small biz in India
Business Standard
In addition, the report highlights that while the number of vulnerabilities
decreased by 20%, the number of malicious attacks continued to skyrocket by
81%. "Augmented by broadband penetration, smaller and emerging cities of
India are exploring ...
<http://business-standard.com/india/news/internet-attacks-target-small-cities-small-biz-in-india/165620/on>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://business-standard.com/india/news/internet-attacks-target-small-cities-small-biz-in-india/165620/on&hl=en&geo=us>

Three simple steps to better patch security
Australian Techworld
It's estimated that 90% of successful attacks against software
vulnerabilities could be prevented with an existing patch or configuration
setting. Yet patching is a persistent challenge for IT managers. With the
glut of patches released each year, ...
<http://www.techworld.com.au/whitepaper/370522/three-simple-steps-to-better-patch-security/?type=section&arg=312&location=outer_right_sidebar>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.techworld.com.au/whitepaper/370522/three-simple-steps-to-better-patch-security/%3Ftype%3Dsection%26arg%3D312%26location%3Douter_right_sidebar&hl=en&geo=us>

Al Qaeda calls for 'Electronic Jihad' against US
Zee News
An al Qaeda operative, in the six-minute video, compares vulnerabilities in
essential American computer networks to the flaws in aviation security
before the September 11 attack, reported ABC News. The video further calls
upon Muslims "with expertise ...
<http://zeenews.india.com/news/world/al-qaeda-calls-for-electronic-jihad-against-us_777132.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://zeenews.india.com/news/world/al-qaeda-calls-for-electronic-jihad-against-us_777132.html&hl=en&geo=us>

Hackers May Exploit Application Flaws
Midsize Insider
They exploit weaknesses and vulnerabilities in the code of web applications
to steal information, damage corporate reputations, and extort behavior or
money. An important aspect of building a secure web application is assuring
the strength and security ...
<http://midsizeinsider.com/en-us/article/hackers-may-exploit-application-flaws>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://midsizeinsider.com/en-us/article/hackers-may-exploit-application-flaws&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Tuesday, May 22, 2012

Google Alert - Vulnerabilities

=== News - 10 new results for [Vulnerabilities] ===

Trust Guard Vs. Qualys: Trust Guard Updates Their Website
San Francisco Chronicle (press release)
Both companies offer vulnerability scanning for the purpose of website
security by detecting security holes or vulnerabilities. The webpage has
two sections, the first part titled, Qualys Vulnerability Scanner, which
discusses the products and services ...
<http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2012/05/21/prweb9522674.DTL>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sfgate.com/cgi-bin/article.cgi%3Ff%3D/g/a/2012/05/21/prweb9522674.DTL&hl=en&geo=us>

Security vulnerability reporting framework upgraded for reserchers
Techworld.com
By John E Dunn | Techworld | Published: 19:00, 21 May 2012 The security
industry's Common Vulnerability Reporting Framework (CVRF) framework for
reporting and sharing security vulnerabilities in a machine-readable format
has been given a promised ...
<http://news.techworld.com/security/3359074/security-vulnerability-reporting-framework-upgraded-for-reserchers/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://news.techworld.com/security/3359074/security-vulnerability-reporting-framework-upgraded-for-reserchers/&hl=en&geo=us>

'95 Miles to Go': Director Tom Caltabiano reveals Ray Romano's
vulnerabilities
Examiner.com
"[But] the show's creator Phil Rosenthal combined [Ray's vulnerabilities]
with real events that happened in people's lives to make this a very
sincere and relateable show. It is hard to not love Ray. His wife might
disagree, though.
<http://www.examiner.com/article/95-miles-to-go-director-tom-caltabiano-reveals-ray-romano-s-vulnerabilities>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.examiner.com/article/95-miles-to-go-director-tom-caltabiano-reveals-ray-romano-s-vulnerabilities&hl=en&geo=us>

Veracode Infographic Details Cybersecurity Risks in Public Companies
MarketWatch (press release)
BURLINGTON, Mass., May 21, 2012 /PRNewswire via COMTEX/ -- Over the last
few years, some of the most disruptive security breaches occurred at some
of the world's most recognized public corporations, taking advantage of
vulnerabilities in software ...
<http://www.marketwatch.com/story/veracode-infographic-details-cybersecurity-risks-in-public-companies-2012-05-21>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/veracode-infographic-details-cybersecurity-risks-in-public-companies-2012-05-21&hl=en&geo=us>

medical implants vulnerable to hackers
WTOP
Security expert Jerome Radcliffe, a diabetic who uses an insulin pump,
showed onlookers at the 2011 Black Hat Technical Security Conference that
his pump's cyber vulnerabilities could lead to severe consequences.
(AP/Isaac Brekken, File) WASHINGTON ...
<http://www.wtop.com/807/2871848/Medical-implants-vulnerable-to-hackers>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.wtop.com/807/2871848/Medical-implants-vulnerable-to-hackers&hl=en&geo=us>

Chinese handset vendor, ZTE admits to security hole in Score
domain-B
ZTE, the world's No 4 handset vendor and one of two Chinese companies under
the radar of US agencies over security concerns, said one of its mobile
phone models sold in the US contained a vulnerability that researchers say,
could allow others to ...
<http://www.domain-b.com/industry/telecom/20120521_handset_vendor.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.domain-b.com/industry/telecom/20120521_handset_vendor.html&hl=en&geo=us>

SIGINT: Few advances in GSM security
The H
European network operators are taking their time updating their networks to
close known security vulnerabilities, cryptography experts reported at the
Chaos Computer Club's SIGINT 12 conference in Cologne, Germany. An analysis
of 105 networks showed ...
<http://www.h-online.com/security/news/item/SIGINT-Few-advances-in-GSM-security-1580983.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.h-online.com/security/news/item/SIGINT-Few-advances-in-GSM-security-1580983.html&hl=en&geo=us>

Data Breaches, Attacks Still Have IT Security Worried, Survey Finds
NetworkComputing.com
1 reason cited for the increased vulnerability is the increased
sophistication of the attacks, followed by the number of ways to attack a
corporate network. Davis says one notable change was a 10-point jump in the
percentage of respondents who cited ...
<http://www.networkcomputing.com/security/240000697>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.networkcomputing.com/security/240000697&hl=en&geo=us>

The new isolationists: Security on independent government networks
Government Security News
According to the National Vulnerability Database, there are over 49000
reported Internet vulnerabilities. And, malicious actors release an
estimated 73000 new malware strains per day. In a recent presentation,
Frank Konieczny, the CTO at the Air Force ...
<http://www.gsnmagazine.com/node/26401?c=access_control_identification>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.gsnmagazine.com/node/26401%3Fc%3Daccess_control_identification&hl=en&geo=us>

OECD Sees New Zealand Economic Growth Picking Up In 2013
4-traders
New Zealand's economic growth is expected to pick up in 2013 but the island
nation's government needs to adhere to its fiscal consolidation plans to
protect it from economic vulnerabilities, in particular relating to debt
levels, the Organization for ...
<http://www.4-traders.com/news/OECD-Sees-New-Zealand-Economic-Growth-Picking-Up-In-2013--14338642/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.4-traders.com/news/OECD-Sees-New-Zealand-Economic-Growth-Picking-Up-In-2013--14338642/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Monday, May 21, 2012

Google Alert - Vulnerabilities

=== News - 4 new results for [Vulnerabilities] ===

Political Vulnerabilities in Sen. Rubio's Past?
WCTV
Reporter: Laura Wides-Monoz and Brendan Farrington, AP Comments are posted
from viewers like you and do not always reflect the views of this station.
by Frank on May 20, 2012 at 06:24 PM If obama's past, which includes him
not being born in the United ...
<http://www.wctv.tv/home/headlines/Political_Vulnerabilities_in_Sen_Rubios_Past__152167015.html?storySection=comments>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.wctv.tv/home/headlines/Political_Vulnerabilities_in_Sen_Rubios_Past__152167015.html%3FstorySection%3Dcomments&hl=en&geo=us>

ZTE admits security hole in Android smartphone
TelecomTiger
ZTE, the world's No.4 handset vendor has admitted that one of its mobile
phone models sold in the United States contains a vulnerability that
researchers say could allow others to control the device, Reuters reports.
The hole affects ZTE's Score model ...
<http://www.telecomtiger.com/Corporate_fullstory.aspx?passfrom=corporate&storyid=14315&section=S162>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.telecomtiger.com/Corporate_fullstory.aspx%3Fpassfrom%3Dcorporate%26storyid%3D14315%26section%3DS162&hl=en&geo=us>

Obama on the High Wire
New York Times (blog)
The roots of Democratic Party vulnerability on affirmative action and other
forms of group-based "preferences" lie in the social, cultural and
moral revolutions of the 1960s and 70s – revolutions that have been the
source of contemporary liberalism's ...
<http://campaignstops.blogs.nytimes.com/2012/05/20/obama-on-the-high-wire/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://campaignstops.blogs.nytimes.com/2012/05/20/obama-on-the-high-wire/&hl=en&geo=us>

"As Georgia Develops it will Place Limits on Capital Flows," Says IMF
The FINANCIAL
Mr. Gardner also stresses that Georgian banks' heavy reliance on foreign
borrowing to finance domestic credit expansion in the years that preceded
the crisis created vulnerabilities that were exposed during the crisis and
that required a large ...
<http://finchannel.com/Main_News/Geo/109713_%E2%80%9CAs_Georgia_Develops_it_will_Place_Limits_on_Capital_Flows,%E2%80%9D_Says_IMF/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://finchannel.com/Main_News/Geo/109713_%25E2%2580%259CAs_Georgia_Develops_it_will_Place_Limits_on_Capital_Flows,%25E2%2580%259D_Says_IMF/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Sunday, May 20, 2012

Google Alert - Vulnerabilities

=== News - 5 new results for [Vulnerabilities] ===

Political vulnerabilities in Sen. Rubio's past?
The Associated Press
Marco Rubio, a rising GOP figure seen as a possible Mitt Romney running
mate, there are questions about whether potential vulnerabilities in his
personal and political background might hold him back. The 40-year-old
Florida lawmaker has close ties to a ...
<http://www.google.com/hostednews/ap/article/ALeqM5hwmcnBQadHQXsNXDgowy48CSbafA?docId=c2487f50413c43048e8f21fba1841480>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.google.com/hostednews/ap/article/ALeqM5hwmcnBQadHQXsNXDgowy48CSbafA%3FdocId%3Dc2487f50413c43048e8f21fba1841480&hl=en&geo=us>

Marco Rubio's Past Political Vulnerabilities?
Fox News
MIAMI – Marco Rubio is a young senator and a rising star within the
Republican party who has been cited as a possible Mitt Romney running mate,
but questions exist about whether potential vulnerabilities in his personal
and political background might ...
<http://latino.foxnews.com/latino/politics/2012/05/19/marco-rubio-past-political-vulnerabilities/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://latino.foxnews.com/latino/politics/2012/05/19/marco-rubio-past-political-vulnerabilities/&hl=en&geo=us>

Rubio's past includes political vulnerabilities
Atlanta Journal Constitution
The country is only just starting to get to know Rubio and his political
vulnerabilities, though Florida residents know both well. Rubio's
relationship with fellow freshman lawmaker Rep. David Rivera, now facing a
federal probe into tax evasion, ...
<http://www.ajc.com/news/nation-world/rubios-past-includes-political-1440801.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.ajc.com/news/nation-world/rubios-past-includes-political-1440801.html&hl=en&geo=us>

Dollar in demand against Eurozone vulnerability
gulfnews.com
Defensive considerations will remain extremely important in the short-term
as markets continue to focus on the Eurozone crisis and global
vulnerabilities. There is likely to be further defensive demand for the US
currency as the US Treasury market ...
<http://gulfnews.com/business/banking/dollar-in-demand-against-eurozone-vulnerability-1.1024991>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://gulfnews.com/business/banking/dollar-in-demand-against-eurozone-vulnerability-1.1024991&hl=en&geo=us>

Google releases Chrome 19, adds tab sync and patches 20 bugs
ITworld.com
May 19, 2012, 7:14 AM — Google on Tuesday released Chrome 19, patched 20
vulnerabilities in the browser and doled out $16500 in bug bounties and
rewards to independent researchers. Chrome 19's most obvious change is the
new support for tab ...
<http://www.itworld.com/software/277314/google-releases-chrome-19-adds-tab-sync-and-patches-20-bugs>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.itworld.com/software/277314/google-releases-chrome-19-adds-tab-sync-and-patches-20-bugs&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Saturday, May 19, 2012

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Web, Mobile and Cloud Application Vulnerabilities can Pose a Serious
Risk ...
Exec Digital (press release)
Source: Global Digital Forensics New York, NY, May 18, 2012 --(PR.com)--
Web, mobile and cloud application vulnerabilities are exposing US cyber
assets to serious security risks, and the threat is growing by the day. But
sometimes it takes more.
<http://www.execdigital.com/press_releases/web-mobile-and-cloud-application-vulnerabilities-can-pose-a-serious-risk---application-security-test>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.execdigital.com/press_releases/web-mobile-and-cloud-application-vulnerabilities-can-pose-a-serious-risk---application-security-test&hl=en&geo=us>

Common Vulnerability Reporting Framework updated
Help Net Security
The Industry Consortium for Advancement of Security on the Internet (ICASI)
announced Common Vulnerability Reporting Framework (CVRF), Version 1.1.
Enhancements offer users a more comprehensive and flexible format, while
reducing duplication and the ...
<http://www.net-security.org/secworld.php?id=12954>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.net-security.org/secworld.php%3Fid%3D12954&hl=en&geo=us>

Java and Flash vulnerabilities being exploited by cyber spies
Techworld.com
In recent months, Shadowserver has seen malware exploiting zero-day
vulnerabilities in cyberespionage attacks. "Frequently by the time a patch
is released for the vulnerabilities, the exploit has already been in the
wild for multiple weeks or months ...
<http://news.techworld.com/security/3358504/java-flash-vulnerabilities-being-exploited-by-cyber-spies/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://news.techworld.com/security/3358504/java-flash-vulnerabilities-being-exploited-by-cyber-spies/&hl=en&geo=us>

Report on Rights of Transgender people and HIV vulnerability
Asian Tribune
By Shobha Shukla – CNS A study titled Lost in Transition: Transgender
People, Rights and HIV Vulnerability in the Asia-Pacific Region was
released in Bangkok to mark the International Day Against Homophobia and
Transphobia. According to this research, ...
<http://www.asiantribune.com/news/2012/05/18/report-rights-transgender-people-and-hiv-vulnerability>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.asiantribune.com/news/2012/05/18/report-rights-transgender-people-and-hiv-vulnerability&hl=en&geo=us>

Microsoft Adopts CVRF Format for Security Bulletins
Threatpost (blog)
Now, there's a effort underway, called the Common Vulnerability Reporting
Framework, to standardize the way that vulnerabilities are reported so that
they're in a common, machine-readable format. The CVRF is the product of a
group called the Industry ...
<http://threatpost.com/en_us/blogs/microsoft-adopts-cvrf-format-security-bulletins-051812>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://threatpost.com/en_us/blogs/microsoft-adopts-cvrf-format-security-bulletins-051812&hl=en&geo=us>

The New York Jets Still Have Multiple Vulnerabilities On Offense
Rant Sports
by Akiva Goldenberg The New York Jets have a number of problems on offense
that they didn't address this off-season. It seems as if general manager
Mike Tannenbaum and head coach Rex Ryan felt the team's biggest problems on
offense in 2011 were the ...
<http://www.rantsports.com/new-york-jets/2012/05/18/the-new-york-jets-still-have-multiple-vulnerabilities-on-offense/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.rantsports.com/new-york-jets/2012/05/18/the-new-york-jets-still-have-multiple-vulnerabilities-on-offense/&hl=en&geo=us>

If software patches are important, why do so many ignore them?
GCN.com
By William Jackson The handling of software vulnerabilities has come a long
way in the past decade with the emergence of generally accepted procedures
for reporting and responding to vulnerabilities. Responsible vendors have
formal programs for issuing ...
<http://gcn.com/articles/2012/06/11/cybereye-software-patching-hits-the-wall.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://gcn.com/articles/2012/06/11/cybereye-software-patching-hits-the-wall.aspx&hl=en&geo=us>

On Distrusting Your Toaster and Other Tiny Dystopias
SYS-CON Media (press release) (blog)
The title referred literally to computer-connected toasters and more
broadly at the problem of security vulnerabilities in a networked world.
Since then, the cybersecurity world has focused more narrowly on corporate
and government network security and ...
<http://www.sys-con.com/node/2280895>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sys-con.com/node/2280895&hl=en&geo=us>

Apache OpenOffice security fixes emerge
Register
Apache OpenOffice 3.4.0, released last week, included fixes for three
security vulnerabilities, all rated as "important". The trio included an
integer overflow error involving problems in handling embedded images and a
memory overwrite bug connecting ...
<http://www.theregister.co.uk/2012/05/18/apache_openoffice_security_fixes/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.theregister.co.uk/2012/05/18/apache_openoffice_security_fixes/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

Friday, May 18, 2012

Google Alert - Vulnerabilities

=== News - 7 new results for [Vulnerabilities] ===

ZTE confirms security hole in US phone
Chicago Tribune
(Reuters) - ZTE Corp, the world's No.4 handset vendor and one of two
Chinese companies under US scrutiny over security concerns, said one of its
mobile phone models sold in the United States contains a vulnerability that
researchers say could allow ...
<http://www.chicagotribune.com/business/sns-rt-us-zte-phonebre84h08j-20120518,0,2278775.story>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.chicagotribune.com/business/sns-rt-us-zte-phonebre84h08j-20120518,0,2278775.story&hl=en&geo=us>

ICASI Releases Update to Its Standardized XML Framework for Reporting IT ...
MarketWatch (press release)
"CVRF 1.1 is a significant step forward in our efforts to broaden awareness
of security vulnerabilities and simplify their reporting," said Russell
Smoak, president of ICASI and director and general manager of Security
Research and Operations at Cisco ...
<http://www.marketwatch.com/story/icasi-releases-update-to-its-standardized-xml-framework-for-reporting-it-system-vulnerabilities-cvrf-version-11-2012-05-17>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/icasi-releases-update-to-its-standardized-xml-framework-for-reporting-it-system-vulnerabilities-cvrf-version-11-2012-05-17&hl=en&geo=us>

Women Blog and Tweet About Their Vulnerabilities
PR.com (press release)
Tucson, AZ, May 18, 2012 --(PR.com)-- Members of the online community,
Women on the Verge, will bare their vulnerabilities through their blogs,
tweets and vlogs, as a means to liberating themselves from the worry their
imperfections cause.
<http://www.pr.com/press-release/413565>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pr.com/press-release/413565&hl=en&geo=us>

Major Vulnerability Announced in Adobe Software
Midsize Insider
When the news was released that Adobe's Flash and Illustrator products had
vulnerabilities, the company refused to patch its software to protect
users' computers. Adobe recently changed its stance on patches, and
released updates for vulnerable ...
<http://midsizeinsider.com/en-us/article/major-vulnerability-announced-in-adobe-s>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://midsizeinsider.com/en-us/article/major-vulnerability-announced-in-adobe-s&hl=en&geo=us>

Vulnerability found in Mobile Spy spyware app
Infosecurity Magazine
But vulnerabilities mean the covertly spied-upon can become the covert spy.
Mobile Spy can run on iPhone, Android, Symbian and Blackberry; and it can
run in stealth mode, making it little different in operation – if not in
intention – to standard ...
<http://www.infosecurity-magazine.com/view/25844/vulnerability-found-in-mobile-spy-spyware-app>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.infosecurity-magazine.com/view/25844/vulnerability-found-in-mobile-spy-spyware-app&hl=en&geo=us>

RealPlayer update fixes security vulnerabilities
The H
RealNetworks is warning users about multiple security vulnerabilities in
its RealPlayer media player application for Windows; the company says that
none of the, now fixed, holes are known to have been used to compromise
systems.
<http://www.h-online.com/security/news/item/RealPlayer-update-fixes-security-vulnerabilities-1578444.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.h-online.com/security/news/item/RealPlayer-update-fixes-security-vulnerabilities-1578444.html&hl=en&geo=us>

AusCERT2012: FreeBSD talks amateur bug hunting
SC Magazine Australia
It's now including the Chromium browser in the program through which it
will pay for the most critical vulnerabilities (think violations of the
verified boot path or renderer sandbox escapes using Linux kernel flaws).
The emphasis on large bounties was ...
<http://www.scmagazine.com.au/News/301385,auscert2012-freebsd-talks-amateur-bug-hunting.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.scmagazine.com.au/News/301385,auscert2012-freebsd-talks-amateur-bug-hunting.aspx&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail