The fundamental failure of endpoint security
According to Stefan Frei, Research Analyst Director with Secunia, it’s not the vulnerabilities in Microsoft’s products we should worry about, but those in …
According to Stefan Frei, Research Analyst Director with Secunia, it’s not the vulnerabilities in Microsoft’s products we should worry about, but those in …
Several vulnerabilities in PDF-Pro can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. The application loads libraries (e.g. …
In the video below, Secunia CSO Thomas Kristensen talks about the company and their product line. Kristensen tackles the following questions: Tell us more about Secunia, and …
A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a Denial of Service, according to Secunia. When an authoritative server …
Some vulnerabilities have been reported in Mailman, which can be exploited by malicious users to conduct script insertion attacks, according to Secunia. Input passed via the …
In this RSA Conference 2011 video showcase, you can check out the look and feel of the event and the expo floor. The companies featured in the video are Qualys, Secunia, …
The expo floor is teeming with knowledge, solutions and possibilities: The Secunia booth. Splunk demoing their product. The Cenzic booth. The Motorola AirDefense booth. Ivan …
Vulnerabilities have been reported in Django, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion and cross-site …
A security issue exists in multiple HTC products and can be exploited by malicious people to disclose potentially sensitive information, according to Secunia. The security …
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting (XSS) attacks, according to Secunia. The …
Multiple vulnerabilities have been reported in Symantec products, which can be exploited by malicious people to cause a Denial of Service and compromise a vulnerable system, …
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …