Wednesday, July 31, 2013

Google Alert - Vulnerabilities

News 10 new results for Vulnerabilities
Redskins vulnerabilities on defense Washington Post
July 30 2013 5:00 PM EDT — The Post Sports Live crew debates whether the Redskins defense will be more susceptible to the run or the pass in the first part of ...
See all stories on this topic »
Software vulnerabilities: Bugs v Flaws lessons from June Techworld.com (blog)
When it comes to software defects, we generally categorise vulnerabilities to be as the result of a bug or a flaw. A bug is generally caused by a failure in ...
See all stories on this topic »
Cisco Issues Security Patch for Vulnerabilities in Unified ... UCStrategies
Cisco released a security patch addressing some of the vulnerabilities in its Unified Communications Manager (Unified CM). The said vulnerabilities may allow ...
See all stories on this topic »
Are costs and vulnerabilities making military leaders nervous about ... Military & Aerospace Electronics (blog)
Still, the relatively high and recurring costs of SATCOM, as well as its potential vulnerability to jamming and hacking may be encouraging military planners to ...
See all stories on this topic »
Joseph Morgan on Klaus' 'vulnerabilities' and 'reveling' on 'The ... Examiner.com
We've always seen Klaus (Joseph Morgan) as a ruthless vampire figure who makes "a fair few pacts" but has no qualms about going back against his word, also ...
See all stories on this topic »
Five Questions to Ask When Choosing a Vulnerability Management ... IT Business Edge
Click through for five questions organizations should ask when evaluating a vulnerability management solution, as identified by Gidi Cohen, CEO and founder of ...
See all stories on this topic »
How To Hack A Porsche Research Muffled InformationWeek
Court halts disclosure of research into exploitable vulnerabilities in late-'90s immobilizer technology still being used to secure cars made by Audi, Volkswagen ...
See all stories on this topic »
IBM Unveils New Software to Help Organizations Identify and ... ThomasNet News (press release)
As cyber attacks increase in volume and severity, QRadar Vulnerability ... More than 70,000[1] security vulnerabilities exist today, with more than a dozen more ...
See all stories on this topic »
Panda Security Boosts Security for SMBs with Integrated Solution ... PR Web (press release)
This new anti-exploit technology detects and neutralizes malware like Blackhole or Redkit that exploits zero-day vulnerabilities (in Java, Adobe, MS Office, etc.) ...
See all stories on this topic »
Tenable Adds New Passive Vulnerability Scanner (PVS®) to the ... SYS-CON Media (press release)
Tenable Network Security, the leader in real-time vulnerability management, today announced at Black Hat USA 2013 that its Passive Vulnerability Scanner ...
See all stories on this topic »
Blogs 1 new result for Vulnerabilities
Hardening WordPress Security: Understanding Vulnerabilities ... Karan Chopra
We did earlier talked about on how to secure WordPress in different ways, but now taking the things to a step further. It's best to understand different ...
JustWP - WordPress Themes, Plugins, Tutorials, Opinions

Delete this alert.
Create another alert.
Manage your alerts.

Tuesday, July 30, 2013

Google Alert - Vulnerabilities

News 10 new results for Vulnerabilities
Sex-trafficking sting highlights vulnerability of foster children Los Angeles Times
WASHINGTON — More than 100 sexually exploited teenagers, some as young as 13, were rescued during a nationwide sex-trafficking sting over the weekend, ...
See all stories on this topic »
Can Cyber Attacks Prompt the Next Financial Crisis? Bloomberg
They have vulnerabilities in the computer systems because of software code that is not being written properly or programs. So, somebody gets a foothold in a ...
See all stories on this topic »
Microsoft announces MAPP overhaul Help Net Security
Also, some trusted vendors will be now getting a three day window instead of the current one-day to come up with a signatures for vulnerabilities, while ...
See all stories on this topic »
SB13-210: Vulnerability Summary for the Week of July 22, 2013 Newsroom America
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology ...
See all stories on this topic »
Report: Lenovo products banned by western governments over ... ITProPortal
According to an investigation from the Australian Financial Review, researchers uncovered backdoor vulnerabilities and firmware weaknesses in Lenovo chips ...
See all stories on this topic »
EMP vulnerability invites catastrophe Canada Free Press
A corollary to this rule might be "Vulnerability invites catastrophe." For just as bad actors have, throughout history, been induced to act aggressively when they ...
See all stories on this topic »
Celebrated Hacker Barnaby Jack Dies at 35 eSecurity Planet
New Zealand-born hacker Barnaby Jack died on July 25, 2013 at the age of 35, days before he was due to give a presentation on vulnerabilities in medical ...
See all stories on this topic »
SecureState Introduces a Business Model for Information Security to ... The Herald | HeraldOnline.com
Companies pay for assessments, they fix problems and patch vulnerabilities, but then the network environment changes and their back to square one.
See all stories on this topic »
Continual vigilance key to security, says Damballa ComputerWeekly.com
Increasing complexity makes it more difficult to find vulnerabilities or guarantee that these systems are free of vulnerabilities. At the same time, it makes it easier ...
See all stories on this topic »
Why Your CMS Is A Hacker's Dream Come True TechWeekEurope UK
Platforms whose vulnerabilities hackers seek to exploit cover the Internet. I'm talking, specifically, about content management systems (CMSs). As you may be ...
See all stories on this topic »
Blogs 1 new result for Vulnerabilities
ESA-2013-033: EMC NetWorker Information Disclosure Vulnerability
SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest ...
SecurityFocus Vulnerabilities

Delete this alert.
Create another alert.
Manage your alerts.

Monday, July 29, 2013

Google Alert - Vulnerabilities

News 8 new results for Vulnerabilities
Security Vulnerabilities - Surveillance via Symantec Web Gateway IT News Online
(Nasdaq: SYMC), was shipped while containing several critical vulnerabilities. The vulnerabilities were discovered in the course of a short crash test which was ...
See all stories on this topic »
Western spooks' banned Lenovo PCs after finding back doors Register
Serious backdoor vulnerabilities in hardware and firmware were apparently discovered during the tests which could allow attackers to remotely access devices ...
See all stories on this topic »
NT OBJECTives, Inc.'s Web Application Security Software Blocks ... HispanicBusiness.com
NT OBJECTives, Inc.'s Web Application Security Software Blocks Approximately 95% of Application Vulnerabilities Through Sourcefire's IPS and ModSecurity's ...
See all stories on this topic »
Howard Schmidt to Keynote at CodenomiCON Las Vegas HispanicBusiness.com
Due to the criticality of the SNMP security vulnerabilities, the Administration discussed the security advisory inside the Oval Office. Previously, Schmidt was Chief ...
See all stories on this topic »
IBM launches integrated security solution Times of India
IBM QRadar Vulnerability Manager gives security officers an overview across ... More than 70,000 security vulnerabilities exist today, with more than a dozen ...
See all stories on this topic »
CrowdStrike to Present Three Talks at Black Hat 2013 Broadway World
These talks will reveal critical security vulnerabilities in processor architecture and operating systems used by most modern smartphone platforms; a new tool ...
See all stories on this topic »
"Hackers for Hire". NATO video enters vulnerability disclosure debate Graham Cluley Security News
As the video makes clear, there is an increasing market for vulnerabilities. Those who find security flaws can not only profit from bug bounties paid out by the ...
See all stories on this topic »
Major spy agencies have banned use of Lenovo PCs due to ... Afterdawn.com
... the mid-2000s "after intensive laboratory testing of its equipment allegedly documented "back-door" hardware and "firmware" vulnerabilities in Lenovo chips."
See all stories on this topic »
Blogs 1 new result for Vulnerabilities
Ray Donovan Review: Vulnerabilities - TV Fanatic carissa@tvfanatic.com (Carissa Pavlica)
On Ray Donovan this week, his world starts to crumble. As he struggles to keep it together, Abby finds him in a very vulnerable position.
TV Fanatic

Delete this alert.
Create another alert.
Manage your alerts.

Saturday, July 27, 2013

Google Alert - Vulnerabilities

News 10 new results for Vulnerabilities
Researchers identify vulnerabilities of the Ebola virus Vaccine News Daily
Ebola virus cells can no longer replicate or infect hosts when a certain protein is disabled, according to a study recently published in Cell Host and Microbe.
See all stories on this topic »
NT OBJECTives, Inc's Web Application Security Software Blocks ... IT Business Net
IRVINE, Calif., July 25, 2013 /PRNewswire/ --NT OBJECTives, Inc., provider of the most automated, comprehensive and accurate web application security ...
See all stories on this topic »
Spy Agencies Found Back-Door Vulnerabilities in Lenovo PCs The Next Web
Spy agencies in the UK, Australia and the US have internally banned using Lenovo PCs because of remote access vulnerabilities that were discovered during ...
See all stories on this topic »
Five Arrested In Massive Hacking Bust RedOrbit
This week, four Russian nationals and a Ukrainian national have been arrested and charged with running an alleged hacking organization. This sophisticated ...
See all stories on this topic »
IBM Unveils New Software to Help Organizations Identify and ... Sacramento Bee
IBM QRadar Vulnerability Manager gives security officers a prioritized view across ... More than 70,000[1] security vulnerabilities exist today, with more than a ...
See all stories on this topic »
IBM unveils software to identify and predict security risk Help Net Security
QRadar Vulnerability Manager gives security officers a prioritized view across ... More than 70,000 security vulnerabilities exist today, with more than a dozen ...
See all stories on this topic »
IBM Looks To Risk Prediction With QRadar Vulnerability Manager TechWeekEurope UK
QRadar Vulnerability Manager is designed to give security officers a prioritised view across their entire network to enable them to quickly strengthen and fortify ...
See all stories on this topic »
Barnaby Jack And The Hacker Ethos Dark Reading
So I was all fired up to talk about what I'm expecting to see next week at Black Hat. For those focused on vulnerabilities and threats, it's like Homecoming ...
See all stories on this topic »
Security Vendors: Do No Harm, Heal Thyself Krebs on Security
On Thursday, Symantec quietly released security updates to fix serious vulnerabilities in its Symantec Web Gateway, a popular line of security appliances ...
See all stories on this topic »
Big Blue Unleashes Big Data Security Intelligence SiliconANGLE (blog)
QRadar Vulnerability Manager, can not only scan the corporate network, but it ... Also very neat – Sometimes there are vulnerabilities out there that don't have a ...
See all stories on this topic »
Blogs 2 new results for Vulnerabilities
Spy Agencies Found Back-Door Vulnerabilities in Lenovo PCs Josh Ong
Spy agencies in the UK, Australia and the US have banned use of Lenovo PCs because of remote access vulnerabilities that were discovered during testing.
The Next Web
[ MDVSA-2013:201 ] ruby - SecurityFocus
A vulnerability has been discovered and corrected in ruby: A flaw was found in Ruby's SSL client's hostname identity check when handling certificates that ...
SecurityFocus Vulnerabilities

Delete this alert.
Create another alert.
Manage your alerts.

Friday, July 26, 2013

Google Alert - Vulnerabilities

News 10 new results for Vulnerabilities
Multiple Vulnerabilities in Symantec Web Gateway Infosecurity Magazine (US)
Spear-phishing is an attack that attempts to ensnare a specific individual or group of victims via email; water hole attacks wait for the victim to come to the trap.
See all stories on this topic »
Anti-Scraping Scanning Tool Reveals Web Site Vulnerabilities To ... Sacramento Bee
ScrapeDefender's vulnerability scanner functions like a personal anti-scraping consultant, peering deep into the site's code to pinpoint weaknesses. The system ...
See all stories on this topic »
Preventing the exploitation of human vulnerabilities Help Net Security
Secure Mentem released the Human Incident Response Service to specifically address the issue of exploiting human vulnerabilities. Some of the most noted ...
See all stories on this topic »
IBM unveils vulnerability manager as part of QRadar SIEM Network World
Network World - IBM today announced vulnerability-management capabilities available with its security information and event management (SIEM) product, ...
See all stories on this topic »
Record-Setting Data Breach Highlights Corporate Security Risks Intelligent Enterprise (blog)
Case of five men indicted Thursday for allegedly stealing more than 160 million credit card numbers, in what Justice Department calls a record size scheme, ...
See all stories on this topic »
Better Bug Bounties Mean Safer Software, More Research Demand Dark Reading
In June, Microsoft announced its own limited vulnerability rewards program (VRP) designed to find bugs in its operating-system and browser software before ...
See all stories on this topic »
IBM Unveils New Software to Help Organizations Identify and ... MarketWatch
IBM QRadar Vulnerability Manager gives security officers a prioritized view across their entire network, helping them quickly strengthen and fortify their defenses.
See all stories on this topic »
Study finds that hackers can attack oil, gas field sensors with radio ... PCWorld
Researchers Lucas Apa and Carlos Mario Penagos of IOActive, a computer security firm, say they've found a host of software vulnerabilities in the sensors, ...
See all stories on this topic »
IBM Unveils New Software To Help Organizations Identify And Predict Dark Reading
IBM QRadar Vulnerability Manager gives security officers a prioritized view across their entire network, helping them to quickly strengthen and fortify their ...
See all stories on this topic »
Pat Pilcher: SIM cards cracked New Zealand Herald
Discovered by Karsten Nohl, the first vulnerability is based on the use of an old ... As alarming as both vulnerabilities sound, the good news is that it should take ...
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Thursday, July 25, 2013

Google Alert - Vulnerabilities

News 10 new results for Vulnerabilities
A single text message may hack millions of mobile phones DigitalJournal.com
This vulnerability could affect 750 million phones. He and his team tested close to a thousand SIM cards for vulnerabilities, exploited by sending a hidden SMS.
See all stories on this topic »
Java Vulnerabilities Persist Despite Warnings XBIZ
A recent whitepaper by trust-based security firm Bit9, entitled, "Java Vulnerabilities Report: Write Once, Pwn Anywhere," is casting new light on the ongoing ...
See all stories on this topic »
UN Warns of 'Vulnerabilities' in Mobile Phone SIM Cards as Cyber ... Insurance Journal
A United Nations group that advises countries on cyber security, plans to send out an alert about significant vulnerabilities in mobile phone technology that could ...
See all stories on this topic »
SIM card vulnerabilities easy to fix, researcher says CSO
July 24, 2013 — IDG News Service — A pair of severe security problems in millions of SIM cards should be easy for operators to fix, according to the German ...
See all stories on this topic »
Mitigating Network Security Vulnerabilities at Branch Offices and ... EnterpriseNetworkingPlanet
Distributed enterprise networks face different security challenges and must take different measures to mitigate threats than their more centralized counterparts.
See all stories on this topic »
NT OBJECTives, Inc.'s Web Application Security Software Blocks ... Broadway World
As a result, NTODefend's virtual patching solutions now automatically block an average of 95% of an application's vulnerabilities when leveraged with intrusion ...
See all stories on this topic »
Small Island Developing States to Draw Attention to Climate Change ... AllAfrica.com
Rather than point exclusively to the perennial vulnerability differential that ... It also attempts to analyze strategies that will translate current vulnerabilities into ...
See all stories on this topic »
Network Solutions Knocked Down Again Intelligent Enterprise
MySQL problems to blame for customers' website editing and permission change problems, says hosting provider, but users suspect more nefarious cause.
See all stories on this topic »
IBM: Context Will Speed Security Vulnerability Resolution IT Trends & Analysis (IT-TNA)
Big Blue said more than 70,000 security vulnerabilities exist today, with more than a dozen more being reported daily. However, traditional vulnerability ...
See all stories on this topic »
Symantec spots two Android apps using 'master key' vulnerability CSO
July 23, 2013 — IDG News Service — Hackers are now using a critical vulnerability in Android to modify legitimate smartphone applications, putting users at risk ...
See all stories on this topic »
Blogs 3 new results for Vulnerabilities
[security bulletin] HPSBGN02905 rev.1 - HP ... - SecurityFocus
Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code or result in ...
SecurityFocus Vulnerabilities
Cross-Site Scripting (XSS) in Magnolia CMS - SecurityFocus
Vulnerability Type: Cross-Site Scripting [CWE-79] ... High-Tech Bridge Security Research Lab discovered XSS vulnerability in Magnolia CMS, which can be ...
SecurityFocus Vulnerabilities
Cross-Site Scripting (XSS) in Duplicator WordPress ... - SecurityFocus
Vulnerability Type: Cross-Site Scripting [CWE-79] ... High-Tech Bridge Security Research Lab discovered XSS vulnerability in Duplicator WordPress plugin, ...
SecurityFocus Vulnerabilities
Web 1 new result for Vulnerabilities
SIM card vulnerabilities easy to fix, researcher says - Computerworld
A pair of severe security problems in millions of SIM cards should be easy for operators to fix, according to the German security researcher who found the issues.
www.computerworld.com/.../SIM_card_vulnerabilities_easy_t...

Delete this alert.
Create another alert.
Manage your alerts.

Wednesday, July 24, 2013

Google Alert - Vulnerabilities

=== News - 8 new results for [Vulnerabilities] ===

SIM card vulnerabilities easy to fix, researcher says
PCWorld
A pair of severe security problems in millions of SIM cards should be easy
for operators to fix, according to the German security researcher who found
the issues. Karsten Nohl of Security Research Labs in Berlin previewed
research earlier this week ...
<http://www.pcworld.com/article/2045093/sim-card-vulnerabilities-easy-to-fix-researcher-says.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/article/2045093/sim-card-vulnerabilities-easy-to-fix-researcher-says.html&hl=en&geo=us>

Java Vulnerabilities Persist Despite Warnings
XBIZ
A recent whitepaper by trust-based security firm Bit9, entitled, "Java
Vulnerabilities Report: Write Once, Pwn Anywhere," is casting new light
on the ongoing threats to the most widely deployed software ever.
Explaining that Java was originally ...
<http://newswire.xbiz.com/view.php?id=166524>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://newswire.xbiz.com/view.php%3Fid%3D166524&hl=en&geo=us>

Researchers Identify Vulnerabilities of Ebola Virus
Infection Control Today
Disabling a protein in Ebola virus cells can stop the virus from
replicating and infecting the host, according to researchers from the Icahn
School of Medicine at Mount Sinai. The data are published in July in the
journal Cell Host and Microbe. Ebola ...
<http://www.infectioncontroltoday.com/news/2013/07/researchers-identify-vulnerabilities-of-ebola-virus.aspx>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.infectioncontroltoday.com/news/2013/07/researchers-identify-vulnerabilities-of-ebola-virus.aspx&hl=en&geo=us>

Threats and Vulnerabilities - What Every Contractor Should Know About
The ...
The National Law Review
Nearly three years ago, on September 27, 2010, the President signed into
law the Small Business Jobs Act of 2010 ("Jobs Act"), which directed
the Small Business Administration ("SBA") to implement a variety of
small business size and integrity ...
<http://www.natlawreview.com/article/threats-and-vulnerabilities-what-every-contractor-should-know-about-small-business-a>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.natlawreview.com/article/threats-and-vulnerabilities-what-every-contractor-should-know-about-small-business-a&hl=en&geo=us>

Java slammed for security vulnerabilities
Expert Reviews
Java's vulnerabilities and prevalence combine to make it "perhaps the
single most important security problem" facing today's computer users,
according to security experts from Bit9. A Bit9 Vulnerability report notes
that Java's ubiquity combined with ...
<http://www.expertreviews.co.uk/software/1301200/java-slammed-for-security-vulnerabilities>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.expertreviews.co.uk/software/1301200/java-slammed-for-security-vulnerabilities&hl=en&geo=us>

How Bug Bounty Programs Bring Big Savings and Better Security
CIO
Bug bounty programs are useful to large companies because they encourage
hackers to report software vulnerabilities before they're exploited. The
alternative for many hackers is either to publicize vulnerabilities they
find for the recognition it ...
<http://www.cio.com/article/736731/How_Bug_Bounty_Programs_Bring_Big_Savings_and_Better_Security>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.cio.com/article/736731/How_Bug_Bounty_Programs_Bring_Big_Savings_and_Better_Security&hl=en&geo=us>

Why vulnerability data doesn't tell the whole story
FierceCIO
Don't just take vulnerability data at face value, caution Brian Martin and
Steve Christey, members of the CVE, Common Vulnerabilities and Exposures,
editorial board. The researchers are warning that vulnerability statistics
have been misused over the ...
<http://www.fiercecio.com/techwatch/story/why-vulnerability-data-doesnt-tell-whole-story/2013-07-23>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.fiercecio.com/techwatch/story/why-vulnerability-data-doesnt-tell-whole-story/2013-07-23&hl=en&geo=us>

Symantec spots two Android apps using 'master key' vulnerability
PCWorld
Hackers are now using a critical vulnerability in Android to modify
legitimate smartphone applications, putting users at risk of being spied
on. Security vendor Symantec wrote on Tuesday that it found two
applications being distributed in Chinese ...
<http://www.pcworld.com/article/2045087/symantec-spots-two-android-apps-using-master-key-vulnerability.html>
See all stories on this topic:
<http://news.google.com/news/story?ncl=http://www.pcworld.com/article/2045087/symantec-spots-two-android-apps-using-master-key-vulnerability.html&hl=en&geo=us>

This once a day Google Alert is brought to you by Google.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Delete this Google Alert:
http://www.google.com/alerts/remove?hl=en&gl=us&source=alertsmail&s=AB2Xq4h73uDuUaTj8-CUHcryQFnZut4U2bzcgRg

Create another Google Alert:
http://www.google.com/alerts?hl=en&gl=us&source=alertsmail

Sign in to manage your alerts:
http://www.google.com/alerts/manage?hl=en&gl=us&source=alertsmail