Sunday, June 03, 2012

Google Alert - Vulnerabilities

=== News - 5 new results for [Vulnerabilities] ===

Software flaws let hackers crack security files
Tbo.com
Computer expert Charlie Miller found what is called a "zero day," a
vulnerability in the software that has never been made public and for which
there is no known fix. By The Washington Post Charlie Miller prepared his
cyberattack in a bedroom office at ...
<http://www2.tbo.com/news/nation-world/2012/jun/03/namaino12-software-flaws-let-hackers-crack-securit-ar-411185/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www2.tbo.com/news/nation-world/2012/jun/03/namaino12-software-flaws-let-hackers-crack-securit-ar-411185/&hl=en&geo=us>

Understanding cyberspace is key to defending against digital attacks
Washington Post
The same code that unleashed a communications revolution has also created
profound vulnerabilities for societies that depend on code for national
security and economic survival. Miller's iPhone offensive showed how
anything connected to networks these ...
<http://www.washingtonpost.com/investigations/understanding-cyberspace-is-key-to-defending-against-digital-attacks/2012/06/02/gJQAsIr19U_story.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.washingtonpost.com/investigations/understanding-cyberspace-is-key-to-defending-against-digital-attacks/2012/06/02/gJQAsIr19U_story.html&hl=en&geo=us>

All grown up
WA today
What appeared to be her vulnerabilities were their vulnerabilities; what
appeared to be her strengths and determination were theirs, too. As someone
who was mostly unmoved and only occasionally impressed by those albums, I
found that this confirmed ...
<http://www.watoday.com.au/entertainment/music/all-grown-up-20120531-1zjqb.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.watoday.com.au/entertainment/music/all-grown-up-20120531-1zjqb.html&hl=en&geo=us>

The world's scariest computer virus
Chicago Daily Herald
That said, both types of code essentially consist of three elements,
according to Herb Lin, chief scientist at the National Research Council: a
vulnerability, access and payload. Think of a computer system as a
walled-in garden.
<http://www.dailyherald.com/article/20120602/business/706029915/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.dailyherald.com/article/20120602/business/706029915/&hl=en&geo=us>

Risks of boomerangs a reality in world of cyberwar
BusinessWeek
Viruses and malicious software, known as malware, rely on vulnerabilities
in commercial software and hardware products. But it is hard to design a
single payload that always will succeed because the target may have fixed a
software vulnerability or ...
<http://www.businessweek.com/ap/2012-06/D9V4VN580.htm>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.businessweek.com/ap/2012-06/D9V4VN580.htm&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

0 Comments:

Post a Comment

<< Home