Google Alert - Vulnerabilities
=== News - 7 new results for [Vulnerabilities] ===
Researchers: Steam URL protocol can be abused to exploit game
vulnerabilities
PCWorld
Attackers can abuse the way browsers and other applications handle steam://
protocol URLs in order to exploit serious vulnerabilities in the Steam
client or games installed through the platform, according to researchers
from startup vulnerability ...
<http://www.pcworld.com/article/2012128/researchers-steam-url-protocol-can-be-abused-to-exploit-game-vulnerabilities.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/article/2012128/researchers-steam-url-protocol-can-be-abused-to-exploit-game-vulnerabilities.html&hl=en&geo=us>
3 Must-Fix Vulnerabilities Top Oracle CPU Patches
Dark Reading
Of particular note among the fixed vulnerabilities named by Oracle were two
flaws with a CVSS base score of 10.0, one for the Core RDBMS database
product and one for Oracle Fusion Middleware's JRockit component, as well
as another MySQL flaw with a ...
<http://www.darkreading.com/vulnerability-management/167901026/security/news/240009195/3-must-fix-vulnerabilities-top-oracle-cpu-patches.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/vulnerability-management/167901026/security/news/240009195/3-must-fix-vulnerabilities-top-oracle-cpu-patches.html&hl=en&geo=us>
Corps study cites vulnerabilities in wake of Missouri River flooding
Columbia Daily Tribune
KANSAS CITY — A study released by the U.S. Army Corps of Engineers
yesterday said the agency did what it could to manage the historic 2011
flooding on the Missouri River but that more repairs, research and
monitoring are needed to mitigate damage in ...
<http://www.columbiatribune.com/news/2012/oct/16/corps-study-cites-vulnerabilities-in-wake-of/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.columbiatribune.com/news/2012/oct/16/corps-study-cites-vulnerabilities-in-wake-of/&hl=en&geo=us>
Anger in New Zealand Over Leaky Government Computers
New York Times (blog)
He had been told there was a "giant vulnerability" in the Ministry of
Social Development's computer system, an exposure that allowed anyone to
gain access to thousands of personal and private files in the ministry's
database. Using a public computer ...
<http://rendezvous.blogs.nytimes.com/2012/10/17/anger-in-new-zealand-over-leaky-government-computers/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://rendezvous.blogs.nytimes.com/2012/10/17/anger-in-new-zealand-over-leaky-government-computers/&hl=en&geo=us>
Hackers Exploit 'Zero-Day' Bugs For 10 Months On Average Before They're ...
Forbes
Software vendors are constantly on the watch for so-called "zero day"
vulnerabilities–flaws in their code that hackers find and exploit before
the first day companies become aware of them. But the term "zero-day"
doesn't capture just how early hackers' ...
<http://www.forbes.com/sites/andygreenberg/2012/10/16/hackers-exploit-software-bugs-for-10-months-on-average-before-theyre-fixed/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.forbes.com/sites/andygreenberg/2012/10/16/hackers-exploit-software-bugs-for-10-months-on-average-before-theyre-fixed/&hl=en&geo=us>
Don't ignore Windows 8 security when reviewing desktop vulnerabilities
TechTarget
As expected, there has been a lot of hype over the forthcoming Windows 8
operating system. Will it be good for the enterprise? Well, that's sort of
a personal preference. I'm certainly not in love with the new Windows 8
interface, ...
<http://searchenterprisedesktop.techtarget.com/tip/Dont-ignore-Windows-8-security-when-reviewing-desktop-vulnerabilities>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://searchenterprisedesktop.techtarget.com/tip/Dont-ignore-Windows-8-security-when-reviewing-desktop-vulnerabilities&hl=en&geo=us>
Red Cross hosts regional training
Caymanian Compass
The training was aimed at teaching representatives the skills needed to
assess vulnerabilities and capacities in communities, providing feedback to
communities and setting up local committees to assist with risk reduction.
"It is a bottom up approach ...
<http://www.compasscayman.com/caycompass/2012/10/17/Red-Cross-hosts-regional-training/>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.compasscayman.com/caycompass/2012/10/17/Red-Cross-hosts-regional-training/&hl=en&geo=us>
This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg
Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail
Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail
0 Comments:
Post a Comment
<< Home