Thursday, August 09, 2012

Google Alert - Vulnerabilities

=== News - 10 new results for [Vulnerabilities] ===

5 Steps To Prevent Twitter Hacks
InformationWeek
Attackers likely gained access to the Reuters WordPress blog by exploiting
known, exploitable vulnerabilities. Mark Jaquith, a lead WordPress
developer as well as a member of its security team, told The Wall Street
Journal that Reuters was using ...
<http://www.informationweek.com/security/vulnerabilities/5-steps-to-prevent-twitter-hacks/240005178>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.informationweek.com/security/vulnerabilities/5-steps-to-prevent-twitter-hacks/240005178&hl=en&geo=us>

Rapid7 Nexpose Introduces IPv6 Discovery and Scanning Capabilities, and ...
MarketWatch (press release)
BOSTON, Aug 08, 2012 (BUSINESS WIRE) -- Rapid7, the leading provider of
security risk intelligence solutions, today announced that the new version
of its vulnerability management solution, Rapid7(R) Nexpose, introduces
features for discovering and ...
<http://www.marketwatch.com/story/rapid7-nexpose-introduces-ipv6-discovery-and-scanning-capabilities-and-reduces-signal-to-noise-ratio-for-vulnerability-management-enabling-security-professionals-to-focus-on-highest-priority-issues-2012-08-08>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.marketwatch.com/story/rapid7-nexpose-introduces-ipv6-discovery-and-scanning-capabilities-and-reduces-signal-to-noise-ratio-for-vulnerability-management-enabling-security-professionals-to-focus-on-highest-priority-issues-2012-08-08&hl=en&geo=us>

Cyber Security Act fails in Senate: Yet even U.S. military admits
vulnerability
Examiner.com
Late last week the American military released a statement acknowledging
that there has been nearly a twenty (20) fold increase in cyber-attacks
against American infrastructure targets between 2009 and 2011. (See Note
1). Under persistent attack are ...
<http://www.examiner.com/article/cyber-security-act-fails-senate-yet-even-u-s-military-admits-vulnerability>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.examiner.com/article/cyber-security-act-fails-senate-yet-even-u-s-military-admits-vulnerability&hl=en&geo=us>

Top 3 HTML5 Vulnerability Risk Categories
Dark Reading
New advice out from Forrester Research during the past week urges companies
to step up the pace of their HTML5 adoption to keep up with mobility trends
and enable better online customer experiences. But as HTML5 gains relevance
in the enterprise, ...
<http://www.darkreading.com/vulnerability-management/167901026/security/news/240005129/top-3-html5-vulnerability-risk-categories.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/vulnerability-management/167901026/security/news/240005129/top-3-html5-vulnerability-risk-categories.html&hl=en&geo=us>

Strong Haqqani network finances have vulnerabilities, report says
Fierce Homeland Security
Despite its sophistication and power, the Haqqani network has weaknesses
and never has had to deal with a systemic campaign against its financial
network, says a July report (.pdf) from the Combating Terrorism Center at
West Point. The Haqqani network ...
<http://www.fiercehomelandsecurity.com/story/strong-haqqani-network-finances-have-vulnerabilities-report-says/2012-08-08>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.fiercehomelandsecurity.com/story/strong-haqqani-network-finances-have-vulnerabilities-report-says/2012-08-08&hl=en&geo=us>

California Raises the Bar on Climate Change Preparedness Planning
Natural Resources Defense Council (blog)
This research doesn't only focus on the impacts though; it also identifies
opportunities to reduce climate change vulnerabilities. For example, to
address potential water supply shortages, water districts across the state
are striving to increase water ...
<http://switchboard.nrdc.org/blogs/bchou/california_raises_the_bar_on_c.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://switchboard.nrdc.org/blogs/bchou/california_raises_the_bar_on_c.html&hl=en&geo=us>

Web Security - Top Ten Vulnerabilities and Ask the Experts Webinar
DigitalJournal.com (press release)
Web Security - Top Ten Vulnerabilities and Ask the Experts Webinar. >
PRWEB.COM Newswire. Boston MA (PRWEB) August 09, 2012. On August 16th, CNP
Integrations, will hold an "Ask the Experts Security" presentation
featuring popular web security ...
<http://www.digitaljournal.com/pr/830959>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.digitaljournal.com/pr/830959&hl=en&geo=us>

Serving Up Malicious PDFs Through SQL Injection
Dark Reading
These days SQL injection vulnerabilities may seem a dime a dozen, but
creative penetration testers and attackers continue to come up with new
ways to take advantage this vulnerability class that developers persist in
allowing to linger like a bad cold.
<http://www.darkreading.com/database-security/167901020/security/news/240005188/serving-up-malicious-pdfs-through-sql-injection.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/database-security/167901020/security/news/240005188/serving-up-malicious-pdfs-through-sql-injection.html&hl=en&geo=us>

Rapid7 Nexpose Introduces IPv6 Discovery and Scanning Capabilities, and ...
EON: Enhanced Online News (press release)
Meanwhile, attackers are starting to recognize the opportunities in IPv6 as
an attack vector and can tunnel in through IPv4 devices to then exploit the
IPv6 vulnerabilities currently not being identified and addressed. This
threat is amplified by the ...
<http://eon.businesswire.com/news/eon/20120808005221/en/rapid7/metasploit/nexpose>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://eon.businesswire.com/news/eon/20120808005221/en/rapid7/metasploit/nexpose&hl=en&geo=us>

Nepalese Government Sites Hacked, Serving Zegost Malware
Threatpost (blog)
That same Java vulnerability was used in attacks earlier this year on
Amnesty International and the Institute for National Security Studies in
Israel, Websense said. All three of those attacks used code that was taken
from a Metasploit module for the ...
<http://threatpost.com/en_us/blogs/nepalese-government-sites-hacked-serving-zegost-malware-080812>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://threatpost.com/en_us/blogs/nepalese-government-sites-hacked-serving-zegost-malware-080812&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

0 Comments:

Post a Comment

<< Home