Saturday, August 31, 2013

Google Alert - Vulnerabilities

News 6 new results for Vulnerabilities
EWU looks for vulnerabilities against Oregon State The Spokesman Review
CORVALLIS – They call it a walkthrough, but the Eastern Washington players and coaches moved at a much slower pace during their hour-long session Friday ...
See all stories on this topic »
Tenable launches security "app store" for SecurityCenter 4.7 CIOL
MARYLAND, USA: Tenable Network Security, dealing in real-time vulnerability management, today announced SecurityCenter 4.7. With this release, Tenable ...
See all stories on this topic »
ACADEMI Integrates PaRaBaL's Mobile Device Security Training ... DigitalJournal.com
As an industry leader in security training, ACADEMI has complemented its course curriculum with PaRaBaL's expertise to respond to emerging vulnerabilities in ...
See all stories on this topic »
SB13-231: Vulnerability Summary for the Week of August 12, 2013 Newsroom America
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology ...
See all stories on this topic »
Getting To The Root Of Application Security Problems Dark Reading
Though many enterprises invest in security testing ranging from automated vulnerability scans to full-out penetration testing, in rare instances do organizations ...
See all stories on this topic »
New Study Reveals Only 11% of Information Security Managers ... Sacramento Bee
30, 2013 -- /PRNewswire/ -- Application vulnerabilities are a major factor in the cyber-crime game. The objectives of Quotium's research published today was to ...
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Friday, August 30, 2013

Google Alert - Vulnerabilities

News 10 new results for Vulnerabilities
IMF's Rice Says India's Economic Vulnerabilities Now Elevated Businessweek
India's economy faces bigger vulnerabilities as global liquidity tightens, presenting the government with both a challenge and an opportunity, an International ...
See all stories on this topic »
Hackers targeting Java native layer vulnerabilities to insert malicious ... V3.co.uk
In the past, Java layer vulnerabilities were more common, but that is no longer the case. Before 2013, there was a three-to-one ratio of Java layer vulnerabilities ...
See all stories on this topic »
What is a vulnerability? Computerworld
Network World - Judging by initial appearances, our security testing turned up a ton of vulnerabilities nearly 150 of them. In reality, however, none represented ...
See all stories on this topic »
Sun, sea and network vulnerabilities SC Magazine UK
As the Bring Your Own Device trend continues to grow we are seeing that many people using their smartphones at work are blurring the lines between ...
See all stories on this topic »
Windows 8 Picture Passwords Easily Cracked InformationWeek
Microsoft Windows 8 offers gesture-based passwords, in addition to traditional text-based passwords, in the hope that tracing a pattern on a familiar photograph ...
See all stories on this topic »
What is a vulnerability? Network World
Network World - Judging by initial appearances, our security testing turned up a ton of vulnerabilities – nearly 150 of them. In reality, however, none represented ...
See all stories on this topic »
Sim Card Security Vulnerabilities Revealed Simcards.co.uk
SIM cards power billions of mobile devices across the world, allowing network providers to identify customers irrespective of the device they are using. However ...
See all stories on this topic »
VMware patches denial of service vulnerability in its hypervisors ZDNet
Summary: VMware has patched a vulnerability in its hypervisors that could be ... as CVE-2013-1661 by the Common Vulnerabilities and Exposures project, ...
See all stories on this topic »
HP's new product analyses software security '10 times faster' Computer Business Review
"A holistic approach to software security is imperative, and with the HP Fortify portfolio, organisations have the ability to assess vulnerabilities across all of their ...
See all stories on this topic »
Apple Again Blocks Older Versions of Java Over Vulnerability Mac Rumors
The blockage, which was announced internally to AppleCare and Apple Retail employees, is because of an "unspecified vulnerability" and Apple has blocked ...
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Thursday, August 29, 2013

Google Alert - Vulnerabilities

News 8 new results for Vulnerabilities
Pa. nuclear plant security failings revealed SecurityInfoWatch
Aug. 28--A drill that simulated a terrorist attack on FirstEnergy Corp.'s Beaver Valley nuclear power plant in Beaver County has found a security shortcoming for ...
See all stories on this topic »
OS X Vulnerability Can Allow Superuser Access to Unauthorized ... Mac Rumors
Users looking to exploit a vulnerability in the Sudo Unix command, originally reported back in March, have received some assistance, reports Ars Technica.
See all stories on this topic »
Vulnerability Through Third Parties IT Business Edge (blog)
I was watching a news program last night, and the discussion of the most recent attack on the New York Times came up. Hackers, believed to be the Syrian ...
See all stories on this topic »
App Helps Secure Mobile Devices, Reports Security Status To ... Dark Reading
Among other things, SecurityMetrics offers PCI audits, mobile device vulnerability scanning, penetration testing, and forensic analysis. Founded in October 2000, ...
See all stories on this topic »
Shocking security flaw at CoJ Moneyweb.co.za
The latest security vulnerabilities which exposed private information reported to MyBroadband included the Merafong Municipality and the Ghana visa ...
See all stories on this topic »
Shielding targeted applications Help Net Security
This code executes when the application (i.e. browsers, Java, Word, Excel or Adobe Acrobat reader) opens the content, and exploits vulnerabilities in these ...
See all stories on this topic »
Most Organizations are Woefully Behind in Application Security Infosecurity Magazine
When it comes to locking down enterprise infrastructure, the application layer is responsible for more than 90% of all security vulnerabilities, yet more than 80% ...
See all stories on this topic »
Java 6 Zero Day a Reminder to Upgrade Browser Plug-In Threatpost
Reportedly, exploit code for a previously patched vulnerability in Java 6 has been folded into the Neutrino exploit kit, another reminder for organizations reliant ...
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Wednesday, August 28, 2013

Google Alert - Vulnerabilities

News 7 new results for Vulnerabilities
NY Times, Twitter DNS attacks highlight open-source vulnerabilities ... CSO Magazine
Earlier this year, for example, researchers identified a vulnerability in the popular BIND DNS server software that would allow hackers to crash DNS servers.
See all stories on this topic »
U.S. agencies report concerns over Android security vulnerabilities UPI.com
The document said upwards of 44 percent of Android users worldwide are still using Android versions 2.3.3 to 2.3.7, which still contain security vulnerabilities ...
See all stories on this topic »
The no-patch Java 6 zero-day conundrum DaniWeb (blog)
Java vulnerabilities have hardly been out of the news during the last year. Here at DaniWeb we've covered a number of the stories as they surfaced: Java in the ...
See all stories on this topic »
Tenable Network Security, Inc. Certified on VCE Vblock Systems The Herald | HeraldOnline.com
COLUMBIA, Md. — Tenable Network Security, the leader in real-time vulnerability management, today announced that its Nessus, SecurityCenter, Passive ...
See all stories on this topic »
Cyber protection must shield targeted apps, says Trusteer TechTarget
This code executes when the application such as the browser, Java, Word, Excel or Adobe Acrobat reader opens the content, and exploits vulnerabilities in ...
See all stories on this topic »
HP Helps Enterprises Accelerate Software Security Assessment ... Marketwire (press release)
As a result, secure development practices have declined, decreasing the effectiveness of software vulnerability discovery. From 2011 to 2012, the total ...
See all stories on this topic »
Tesla Model S remote access may let hackers mess with car Torque News
The remote access REST API for the Tesla Model S has security vulnerabilities, according to George Reese, a top Dell Engineer and a Tesla Model S owner.
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Tuesday, August 27, 2013

Google Alert - Vulnerabilities

News 8 new results for Vulnerabilities
Hackers Target Java 6 With Security Exploits InformationWeek
That alert came via F-Secure anti-malware analyst Timo Hirvonen, who reported finding an in-the-wild exploit actively targeting an unpatched vulnerability in ...
See all stories on this topic »
FBI, DHS Worried About Android Vulnerabilities The Droid Guy
Android is currently the most popular mobile operating system in the world today. Statistics show that there are more than 100 million people worldwide use ...
See all stories on this topic »
AVG Technologies Protects Our High-Tech Vulnerabilities Investor's Business Daily
Your computer and smartphone contain much of what you hold dear: financial information, communications, which schools your kids go to. As our ...
See all stories on this topic »
Getting The Most Out Of A Security Red Team Dark Reading
When used effectively, a working red team doesn't just help IT security organizations find vulnerabilities in their environments. Red teams can also help ...
See all stories on this topic »
Microsoft will craft XP patches after April '14, but not for you Australian Techworld
"Legacy products or out-of-support service packs covered under Custom Support will continue to receive security hotfixes for vulnerabilities labeled as 'Critical' ...
See all stories on this topic »
Ponemon Institute and Security Innovation Reveal Vulnerable State ... Fort Mills Times
"Research has shown that the application layer is responsible for over 90% of all security vulnerabilities, yet more than 80% of IT security spending continues to ...
See all stories on this topic »
21CT Unveils Hands-on Security Analytics Methodology for ... SYS-CON Media (press release)
Published today, the first installment in the series is a guide for quickly detecting and mitigating directed DNS vulnerabilities that pose a risk to all businesses.
See all stories on this topic »
Pinterest, StumbleUpon patch privacy flaws SC Magazine Australia
Social networking sites Pinterest and StumbleUpon have patched vulnerabilities in their services that allowed attackers to discover user's personal information.
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Monday, August 26, 2013

Google Alert - Vulnerabilities

News 4 new results for Vulnerabilities
Hack My Google Glass: Security's Next Big Worry? InformationWeek (blog)
Unfortunately, as the Glass QR vulnerability -- patched by Google in June -- illustrates, wearable computing faces still some tricky security and privacy questions.
See all stories on this topic »
DHS: 44% Of Android Users Are Vulnerable To Security Breaches Business Insider
Millions of Android smartphone users are susceptible to security vulnerabilities such as viruses and malware, according to an internal bulletin prepared by the ...
See all stories on this topic »
The Insecure Pacemaker: FDA Issues Guidance for Wireless ... Infosecurity Magazine
The researcher noted that the vulnerabilities open the door to "mass murder." This article is featured in: Encryption • Identity and Access Management • Industry ...
See all stories on this topic »
Sunday September 8th, 2013: Atlanta Falcons vs. New Orleans Saints iSportsTimes.com
5 + 17 +2+0+1+3 = 28 = his personal year (from May 17th, 2013 to May 16th, 2014) = Vulnerabilities. Strengths and weaknesses. Making the impossible ...
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Sunday, August 25, 2013

Google Alert - Vulnerabilities

News 2 new results for Vulnerabilities
2012 Mid-Year Trend and Risk Report Australian Techworld
From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were ...
See all stories on this topic »
Sunday September 8th, 2013: San Francisco 49ers vs. Green Bay ... iSportsTimes.com
19 year + 9 (September) = 28 = his personal month (from September 3rd, 2013 to October 2nd, 2013) = Vulnerabilities. Strengths and weaknesses. Nothing is ...
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Saturday, August 24, 2013

Google Alert - Vulnerabilities

News 4 new results for Vulnerabilities
August's Patch Tuesday Offers Surprising Vulnerabilities CIO Today
on Tuesday released eight security bulletins to patch vulnerabilities in its software · Relevant Products/Services . Three of them are rated critical. The bulletins ...
See all stories on this topic »
Two incidents show vulnerabilities of American trade markets IVCPOST
The recent technological breakdowns have exhibited the vulnerability of the US stock market to these kinds of issues and glitches. This issue is further ...
See all stories on this topic »
Security test researcher funded by US Department of Homeland ... TechTarget
More than anything else, Cornell says, these two factors keep application developers from seeing and fixing major security vulnerabilities. That's why Cornell ...
See all stories on this topic »
Instagram for PC – Just Another Survey Scam Infosecurity Magazine (US)
A security advisory issued today reports that multiple critical vulnerabilities were discovered in Symantec's award winning Web Gateway Appliance 5.1.0 in ...
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Friday, August 23, 2013

Google Alert - Vulnerabilities

News 10 new results for Vulnerabilities
Patent Issued for Pinpointing Security Vulnerabilities in Computer ... HispanicBusiness.com
By a News Reporter-Staff News Editor at Computer Weekly News -- A patent by the inventors Amit , Yair (Herzliya, IL); Hay, Roee (Herzliya, IL); Saltzman, Roi ...
See all stories on this topic »
Russia May Block Tor InformationWeek
In effort to combat child porn, Russian security forces consider installing filters preventing access to Tor networks. But experts say blocking the anonymizing ...
See all stories on this topic »
Cisco Patches DoS, Buffer Overflow Vulnerabilities in UCM Threatpost
Cisco has again pushed out an update for its Unified Communications Manager product, fixing several vulnerabilities that if left unpatched could lead to a denial ...
See all stories on this topic »
FBI's Mueller, as he steps down, fears lingering vulnerabilities Los Angeles Times
WASHINGTON — After 12 years as FBI director, Robert S. Mueller III says he leaves office worried that America is still vulnerable to "lone wolf" terrorists acting ...
See all stories on this topic »
NASDAQ Trading Halt Reinforces Need To Address Technological ... Newsroom America
NASDAQ Trading Halt Reinforces Need To Address Technological Vulnerabilities Of Exchanges: SEC. By Newsroom America Staff at 7:07 am Eastern.
See all stories on this topic »
FM Global Advises Property Owners to Be Proactive, Address ... Insurance Journal
"Property owners in wind-and flood-prone regions should take actions themselves, right now, to understand and address their vulnerabilities. Hurricane ...
See all stories on this topic »
REMINDER/ Cryptography Research Scientists to Share Modern ... Wall Street Journal
The presentation will describe side-channel vulnerabilities uncovered by CRI in the ECDSA algorithm. The ECDSA algorithm is widely deployed in government ...
See all stories on this topic »
NJVC Releases Cyber Security White Papers for Healthcare ... IT News Online
"Cyber attackers, both external and internal, know where healthcare organizations' vulnerabilities are. Healthcare organizations must view cyber security as a ...
See all stories on this topic »
Here's How Hackers Are Saving the World PolicyMic
Some companies even challenge hackers to run attacks on their systems, and offer rewards to hackers who reveal vulnerabilities. After all, where there is ...
See all stories on this topic »
NIST makes new recommendations for system patches, malware ... R & D Magazine
Vulnerabilities in software and firmware are the easiest ways to attack a system, ... A common method to avoid attacks is to "patch" the vulnerabilities as soon as ...
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.

Thursday, August 22, 2013

Google Alert - Vulnerabilities

News 8 new results for Vulnerabilities
Cisco patches serious vulnerabilities in Unified Communications ... PCWorld
Cisco Systems has released new security patches for several versions of Unified Communications Manager (UCM) to address vulnerabilities that could allow ...
See all stories on this topic »
Security Vulnerabilities - Surveillance via Symantec Web Gateway Broadway World
The vulnerabilities enable state-sponsored or criminal hackers to take full control of the Symantec Web Gateway Appliance. The surveillance of all internet web ...
See all stories on this topic »
Vulnerability Makes You a Better Leader Business 2 Community
Often the image of a Vulnerability Makes You a Better Leader image 236431b leader is a figure of strength – all powerful and all knowing. Personally speaking, I ...
See all stories on this topic »
To disclose or not to disclose? The hacker question The Canberra Times
Now, if its researchers find a critical vulnerability that is being actively exploited, Google supports them telling the world seven days, rather than the previous 60 ...
See all stories on this topic »
Your perilous future on Windows XP ZDNet
Things are even worse than you've heard (especially if you run Internet Explorer). Expect a flood of new vulnerabilities and no help for them. Larry Seltzer.
See all stories on this topic »
Jumping Out of IE's Sandbox With One Click Threatpost
Software vendors often give intentionally vague and boring names to the updates they use to fix security vulnerabilities. The lamer the name, the less attention it ...
See all stories on this topic »
Cisco goes public with major vulns Register
UCM 7.1, Cisco advises, has an improper error handling vulnerability that can be used in denial-of-service. An attacker can hose the system by sending ...
See all stories on this topic »
Internet Explorer Update for Windows Released: Microsoft Rolls Out ... Latinos Post
"The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer," said Microsoft in the ...
See all stories on this topic »

Delete this alert.
Create another alert.
Manage your alerts.