Friday, May 25, 2012

Google Alert - Vulnerabilities

=== News - 9 new results for [Vulnerabilities] ===

Bug Bounty Hunters Reveal Eight Vulnerabilities in Google Services
PCWorld
By Loek Essers, IDG-News-Service:Amsterdam-Bureau Security researchers
unveiled eight vulnerabilities in Google services during the Hack in the
Box conference in Amsterdam on Thursday -- but they claim to have
discovered more than 100 such bugs over ...
<http://www.pcworld.com/businesscenter/article/256151/bug_bounty_hunters_reveal_eight_vulnerabilities_in_google_services.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/businesscenter/article/256151/bug_bounty_hunters_reveal_eight_vulnerabilities_in_google_services.html&hl=en&geo=us>

Foxit(R) Reader Continues to Keep Users Safe From Security Vulnerabilities
MarketWatch (press release)
These security flaws are reported to the industry and are identified by
their Common Vulnerabilities and Exposures (CVE) numbers. Recently reported
CVE numbers include CVE-2012-0774, CVE-2012-0775, CVE-2012-0776, and
CVE-2012-0777.
<http://www.marketwatch.com/story/foxitr-reader-continues-to-keep-users-safe-from-security-vulnerabilities-2012-05-24>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/foxitr-reader-continues-to-keep-users-safe-from-security-vulnerabilities-2012-05-24&hl=en&geo=us>

Pwnium Chrome hackers exploited 16 zero-day vulnerabilities
Techworld.com
By Gregg Keizer | Computerworld US | Published: 11:37, 24 May 2012 Google
Chrome hackers used a total of 16 zero-day vulnerabilities to crack the
browser at the inaugural "Pwnium" hacking contest and win $120000. The
number of bugs the two researchers ...
<http://news.techworld.com/security/3359722/pwnium-chrome-hackers-exploited-16-zero-day-vulnerabilities/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://news.techworld.com/security/3359722/pwnium-chrome-hackers-exploited-16-zero-day-vulnerabilities/&hl=en&geo=us>

Homeland Security zeroes in on medical device vulnerabilities
Healthcare IT News
WASHINGTON – Even as they promise better health and easier care delivery,
wireless medical devices (MDs) carry significant security risks. And the
situation is only getting trickier as more and more devices come with
commercial operating systems that ...
<http://www.healthcareitnews.com/news/homeland-security-zeroes-medical-device-vulnerabilities>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.healthcareitnews.com/news/homeland-security-zeroes-medical-device-vulnerabilities&hl=en&geo=us>

Biometric bugs too dangerous for public?
ZDNet Australia
Vulnerabilities in biometric systems are too dangerous to allow the general
public to point out, according to Biometrics Institute technical committee
chair Ted Dunstone — and they should not be encouraged to try. Speaking
to ZDNet Australia and ...
<http://www.zdnet.com.au/biometric-bugs-too-dangerous-for-public-339338607.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com.au/biometric-bugs-too-dangerous-for-public-339338607.htm&hl=en&geo=us>

Patch as Patch Can: All Software Is Flawed
SYS-CON Media (press release)
Across all industries and platforms, the Window of Exploit (WOE) - that is,
the time lag between announced discovery and the availability of a patch -
for web-based vulnerabilities is a whopping 233 days, according to WhiteHat
Security.
<http://www.sys-con.com/node/2284509>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sys-con.com/node/2284509&hl=en&geo=us>

Text or Talk: Is Technology Making You Lonely?
Forbes
Or at least not enough to avoid us feeling increasingly alone. As I wrote
in Find Your Courage, human beings crave intimacy. Neurobiologists have
found we are wired for it. Yet genuine intimacy demands vulnerability and
vulnerability requires courage.
<http://www.forbes.com/sites/womensmedia/2012/05/24/text-or-talk-is-technology-making-you-lonely/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.forbes.com/sites/womensmedia/2012/05/24/text-or-talk-is-technology-making-you-lonely/&hl=en&geo=us>

Establishing a Strategy for Database Security is No Longer Optional
InfoWorld
The report identifies best practices, including: Implementing database
activity monitoring to mitigate the high levels of risk from database
vulnerabilities, and address audit findings in areas such as database
segregation of duties and change ...
<http://www.infoworld.com/d/wp/establishing-strategy-database-security-no-longer-optional-194120>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.infoworld.com/d/wp/establishing-strategy-database-security-no-longer-optional-194120&hl=en&geo=us>

Database Activity Monitoring Is Evolving
CIO
Organizations are increasingly concerned with optimizing database security
and mitigating risks associated with database vulnerabilities. And, the
need to meet compliance requirements is pressuring organizations to adopt
more aggressive and expansive ...
<http://www.cio.com/white-paper/706994/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.cio.com/white-paper/706994/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

0 Comments:

Post a Comment

<< Home