Google Alert - Vulnerabilities
=== News - 7 new results for [Vulnerabilities] ===
Huawei router vulnerabilities exposed
ITWeb
According to PC Advisor, Huawei Technologies said last week that it was
verifying claims that its routers contained critical vulnerabilities, after
security researchers disclosed alleged problems last weekend. "We are
aware of the media reports on security ...
<http://www.itweb.co.za/index.php?option=com_content&view=article&id=57541:huawei-router-vulnerabilities-exposed&catid=198>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.itweb.co.za/index.php%3Foption%3Dcom_content%26view%3Darticle%26id%3D57541:huawei-router-vulnerabilities-exposed%26catid%3D198&hl=en&geo=us>
Hackers Targeting Java Vulnerabilities in Increasing Numbers
Midsize Insider
Oracle doesn't have the best track record when it comes to protecting its
customers from hackers. Just a few months ago, for example, Oracle claimed
it had no intentions of patching a zero-day exploit affecting Oracle
Database -- a vulnerability that the ...
<http://midsizeinsider.com/en-us/article/hackers-targeting-java-vulnerabilities-i>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://midsizeinsider.com/en-us/article/hackers-targeting-java-vulnerabilities-i&hl=en&geo=us>
Exclusive: BSNL ignores warnings of massive database vulnerability
Tech2
A prominent whitehat hacker has contacted Tech2.com with details of a
massive potential security breach of BSNL's corporate network, which the
public-sector telecom giant has so far failed to respond to. Our contact,
who doesn't want to be named, tells us ...
<http://tech2.in.com/news/isps/exclusive-bsnl-ignores-warnings-of-massive-database-vulnerability/353372>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://tech2.in.com/news/isps/exclusive-bsnl-ignores-warnings-of-massive-database-vulnerability/353372&hl=en&geo=us>
iScan Online, Inc. Announces Cloud Security Scanning Service
Virtual-Strategy Magazine
iScan Online, Inc. a provider of online vulnerability scanning solutions,
announces the immediate availability of its online security scanning
service. iScan Online is designed to help SMB (small to medium businesses)
and organizations of all sizes assess the ...
<http://www.virtual-strategy.com/2012/08/07/iscan-online-inc-announces-cloud-security-scanning-service>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.virtual-strategy.com/2012/08/07/iscan-online-inc-announces-cloud-security-scanning-service&hl=en&geo=us>
EPA data breach highlights worrying trend
CFOworld
"Credential thefts are not new vulnerabilities," he said. "These are system
bugs that have been there for seven years and are being exploited now."
Steven said that is happening in both the private sector and government.
"When the Yahoo [data breach] story ...
<http://www.cfoworld.com/technology/44659/epa-data-breach-highlights-worrying-trend>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.cfoworld.com/technology/44659/epa-data-breach-highlights-worrying-trend&hl=en&geo=us>
Basic Aussie services under threat
Herald Sun
The attacks are what are known as "zero day exploits" where
"researchers" discover vulnerabilities in IT systems and then sell it
to an interested party. The information can be used to develop an attack
code and sent through the system - usually before the ...
<http://www.heraldsun.com.au/technology/cyber-sabotage-basic-aussie-services-under-threat/story-fn7celvh-1226445039138>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.heraldsun.com.au/technology/cyber-sabotage-basic-aussie-services-under-threat/story-fn7celvh-1226445039138&hl=en&geo=us>
Canvassing the Targeting of Energy Infrastructure: The Energy
Infrastructure ...
Journal of Energy Security
The debates have at times focused on issues such as price volatility,
resource nationalism, supply chain vulnerability, resource abundance vs.
resource constraints and more recently on the cyber vulnerabilities of
energy information infrastructure networks.
<http://www.ensec.org/index.php?option=com_content&view=article&id=379:canvassing-the-targeting-of-energy-infrastructure-the-energy-infrastructure-attack-database&catid=128:issue-content&Itemid=402>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.ensec.org/index.php%3Foption%3Dcom_content%26view%3Darticle%26id%3D379:canvassing-the-targeting-of-energy-infrastructure-the-energy-infrastructure-attack-database%26catid%3D128:issue-content%26Itemid%3D402&hl=en&geo=us>
This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg
Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail
Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail
0 Comments:
Post a Comment
<< Home