Wednesday, May 15, 2013

Google Alert - Vulnerabilities

=== News - 10 new results for [Vulnerabilities] ===

Microsoft fixes 33 vulnerabilities - Help Net Security
Help Net Security
Today for Patch Tuesday, Microsoft and Adobe are both coming out with
critical fixes for a number of widely installed and attacked programs.
Microsoft has 10 bulletins addressing a total of 33 vulnerabilities, and
Adobe is releasing new versions of ...
<http://www.net-security.org/secworld.php?id=14908>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.net-security.org/secworld.php%3Fid%3D14908&hl=en&geo=us>

Deutsche Telekom launches online code vulnerability scanner
The H
As part of its Developer Garden initiative, German telecommunications
company Deutsche Telekom has launched a cloud service that enables
developers to find security vulnerabilities in their web applications and
mobile apps. The Developer Garden Code ...
<http://www.h-online.com/security/news/item/Deutsche-Telekom-launches-online-code-vulnerability-scanner-1862715.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.h-online.com/security/news/item/Deutsche-Telekom-launches-online-code-vulnerability-scanner-1862715.html&hl=en&geo=us>

MS Office, Lync Vulnerabilities Can Be Exploited by Attackers to Control ...
UCStrategies
The UCStrategies Experts share their expertise in bylined articles, opinion
pieces, blogs, and podcasts, to define unified communications, educate you
about unified communications technologies, and help you make informed
decisions about unified ...
<http://www.ucstrategies.com/unified-communications-newsroom/ms-office-lync-vulnerabilities-can-be-exploited-by-attackers-to-control-infected-systems.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.ucstrategies.com/unified-communications-newsroom/ms-office-lync-vulnerabilities-can-be-exploited-by-attackers-to-control-infected-systems.aspx&hl=en&geo=us>

Is Application Sandboxing The Next Endpoint Security Must-Have?
Dark Reading
"And, by the way, it's a very large and rapidly growing list of kernel
vulnerabilities, a huge footprint of code." That nevertheless may not deter
the market for virtualized containers, which essentially operate under the
principle of reducing the ...
<http://www.darkreading.com/end-user/is-application-sandboxing-the-next-endpo/240154807>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/end-user/is-application-sandboxing-the-next-endpo/240154807&hl=en&geo=us>

Java fast becoming an attack vector of choice - Fudzilla
Fudzilla
Much of the activity has focused on vulnerabilities which are already
patched. This suggests that attackers are hitting vulnerabilities that are
in multiple versions of Java, rather than just one specific version. Jeong
Wook Oh of Microsoft said that ...
<http://www.fudzilla.com/home/item/31377-java-fast-becoming-an-attack-vector-of-choice>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.fudzilla.com/home/item/31377-java-fast-becoming-an-attack-vector-of-choice&hl=en&geo=us>

Destructive power of words on the tweet - Sydney Morning Herald
Sydney Morning Herald
What about AP's vulnerabilities? Attackers launched a ''phishing'' attempt
against AP's emails shortly before the hoax tweet was sent. Phishing
attacks, in which an employee is duped into sending a password to a third
party or clicking a link that ...
<http://www.smh.com.au/business/destructive-power-of-words-on-the-tweet-20130514-2jkyi.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.smh.com.au/business/destructive-power-of-words-on-the-tweet-20130514-2jkyi.html&hl=en&geo=us>

Feds' offensive fueling hacker underground, report says
Network World
That's because cyber weapons typically exploit vulnerabilities in
commercial software, vulnerabilities that the government wants to hide
behind a veil of secrecy where vendors can't patch the flaws to make their
products more secure. Start-up companies ...
<http://www.networkworld.com/news/2013/051413-feds-offensive-fueling-hacker-underground-269716.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.networkworld.com/news/2013/051413-feds-offensive-fueling-hacker-underground-269716.html&hl=en&geo=us>

Adobe releases critical security updates for Reader, Flash Player and
ColdFusion
PCWorld
Adobe has released scheduled security updates for its Reader, Acrobat,
Flash Player and ColdFusion products on Tuesday in order to fix many
critical vulnerabilities, including one that is already actively exploited
by attackers. The Adobe Reader and ...
<http://www.pcworld.com/article/2038725/adobe-releases-critical-security-updates-for-reader-flash-player-and-coldfusion.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/article/2038725/adobe-releases-critical-security-updates-for-reader-flash-player-and-coldfusion.html&hl=en&geo=us>

Air Gaps Won't Protect Your Operations
Automation World
From small-scale hacking or just plain human error on up to full-out
attacks like Stuxnet, there are plenty of vulnerabilities to make network
managers feel like just closing the doors and cutting operations off from
the outside world. But not only is ...
<http://www.automationworld.com/air-gaps-won%E2%80%99t-protect-your-operations>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.automationworld.com/air-gaps-won%25E2%2580%2599t-protect-your-operations&hl=en&geo=us>

Web App Testing Using Real-World Attacks
Dark Reading
Vulnerability management and scanning systems typically combine a number of
techniques to assess the risk faced by a business's information technology,
from scanning files and evaluating the current patch level to launching
attacks and testing for ...
<http://www.darkreading.com/vulnerability/web-app-testing-using-real-world-attacks/240154915>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.darkreading.com/vulnerability/web-app-testing-using-real-world-attacks/240154915&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail

0 Comments:

Post a Comment

<< Home