Google Alert - Vulnerabilities
=== News - 4 new results for [Vulnerabilities] ===
Patch management still big stumbling block in risk management, survey shows
Network World
"Before the advent of numerous regulations and the rise of malicious code
targeting known vulnerabilities, patch management was not a top issue for
many organizations," states the McAfee report. "Today, patch management
must be a top priority to ...
<http://www.networkworld.com/news/2012/052912-mcafee-risk-management-259630.html?hpg1=bn>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.networkworld.com/news/2012/052912-mcafee-risk-management-259630.html%3Fhpg1%3Dbn&hl=en&geo=us>
McAfee Risk and Compliance Outlook Report Finds SIEM and Database Security
Are ...
MarketWatch (press release)
Just like last year's analysis, not all companies are able to pinpoint
threats or vulnerabilities, as a result, 43% indicate that they
over-protect and patch everything they can. "Managing risk through security
and compliance continues to be a leading ...
<http://www.marketwatch.com/story/mcafee-risk-and-compliance-outlook-report-finds-siem-and-database-security-are-top-priorities-2012-05-29>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/mcafee-risk-and-compliance-outlook-report-finds-siem-and-database-security-are-top-priorities-2012-05-29&hl=en&geo=us>
Meet "Flame", The Massive Spy Malware Infiltrating Iranian Computers
Wired News
Also, like Stuxnet, Flame has the ability to spread by infecting USB sticks
using the autorun and .lnk vulnerabilities that Stuxnet used. It also uses
the same print spooler vulnerability that Stuxnet used to spread to
computers on a local network.
<http://www.wired.com/threatlevel/2012/05/flame/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.wired.com/threatlevel/2012/05/flame/&hl=en&geo=us>
Qualifying a "Cyber Arms Race"
SYS-CON Media (press release) (blog)
Vulnerabilities must pre-exist, they cannot be created. The weapon uses the
system itself to create the destructive effect. At a banal level, there are
tons of existing vulnerabilities, but when we get to those that matter the
opportunities lessen ...
<http://www.sys-con.com/node/2285518>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.sys-con.com/node/2285518&hl=en&geo=us>
This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg
Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail
Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail
0 Comments:
Post a Comment
<< Home