Saturday, July 28, 2012

Google Alert - Vulnerabilities

=== News - 8 new results for [Vulnerabilities] ===

Olympic vulnerability
Philippine Star
But the same vulnerabilities remain, and will likely not change for a very
long time. To begin with, the International Olympic Committee does not
really run the individual events of the Games themselves. Each sport is run
by its own International Federation (IF).
<http://www.philstar.com/Article.aspx?articleId=832044&publicationSubCategoryId=69>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.philstar.com/Article.aspx%3FarticleId%3D832044%26publicationSubCategoryId%3D69&hl=en&geo=us>

CTS assesses security vulnerabilities at Western Psychiatric Institute and
Clinic ...
MarketWatch (press release)
PITTSBURGH, July 27, 2012 /PRNewswire via COMTEX/ -- Employees at the
Western Psychiatric Institute and Clinic are disheartened with the
facility's security measures after John Shick gunned down six employees,
killing one of them. "I don't feel any safer ...
<http://www.marketwatch.com/story/cts-assesses-security-vulnerabilities-at-western-psychiatric-institute-and-clinic-after-fatal-shootings-2012-07-27>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/cts-assesses-security-vulnerabilities-at-western-psychiatric-institute-and-clinic-after-fatal-shootings-2012-07-27&hl=en&geo=us>

Bump To Pay -- Or Bump To Hack?
CIO Today
"The short answer is that while there do seem to be security
vulnerabilities with NFC, there's little evidence that they constitute a
serious threat," Charles King, principal analyst of Pund-IT · Relevant
Products/Services told us Friday. "That's because the ...
<http://www.cio-today.com/news/Bump-To-Pay----Or-Bump-To-Hack-/story.xhtml?story_id=12300C3HM0GF>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.cio-today.com/news/Bump-To-Pay----Or-Bump-To-Hack-/story.xhtml%3Fstory_id%3D12300C3HM0GF&hl=en&geo=us>

The real impact of Microsoft's Blue Hat prize
ZDNet (blog)
Two, we see an increase in vulnerability reports from students that have
more free time away from school. And three, it means the security community
is converging in Las Vegas for the Black Hat and DEFCON security
conferences. This will be my twelfth ...
<http://www.zdnet.com/the-real-impact-of-microsofts-blue-hat-prize-7000001592/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.zdnet.com/the-real-impact-of-microsofts-blue-hat-prize-7000001592/&hl=en&geo=us>

Gauging the Severity of Software Feature Misuse
GovInfoSecurity.com
To help organizations minimize those vulnerabilities, the National
Institute of Standards and Technology has issued a new guide that describes
a scoring system information security managers can use to assess the
severity of security risks arising from ...
<http://www.govinfosecurity.com/gauging-severity-software-feature-misuse-a-4993>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.govinfosecurity.com/gauging-severity-software-feature-misuse-a-4993&hl=en&geo=us>

Facebook invites white hats to attack its corporate network
Help Net Security
Nearly a year ago, Facebook introduced its bug bounty program, inviting
security researchers to poke around the site, discover vulnerabilities that
could compromise the integrity or privacy of Facebook user data, and then
responsibly disclose them to the ...
<http://www.net-security.org/secworld.php?id=13332>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.net-security.org/secworld.php%3Fid%3D13332&hl=en&geo=us>

Facebook pays hackers over $400000 to hunt down security bugs
The Verge
Facebook doesn't offer bounties for vulnerabilities relating to denial of
service, spamming techniques, third party app vulnerabilities, or third
party site vulnerabilities with Facebook integration. The company hopes
that by continually cultivating relationships ...
<http://www.theverge.com/2012/7/27/3193634/facebook-hacker-bounties>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.theverge.com/2012/7/27/3193634/facebook-hacker-bounties&hl=en&geo=us>

Seattle security startup seeks to eliminate vulnerable code from the public
domain
GeekWire
Code vulnerabilities that propagate through code reuse (i.e. copy/paste)
are no laughing matter. One small error, like an unchecked buffer, can find
its way into tens or even hundreds of different projects and products. The
risks are particularly acute when ...
<http://www.geekwire.com/2012/seattle-security-startup-seeks-eliminate-vulnerable-code/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.geekwire.com/2012/seattle-security-startup-seeks-eliminate-vulnerable-code/&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

0 Comments:

Post a Comment

<< Home