Lifecycle model for managing unknown vulnerabilities
Codenomicon released its Unknown Vulnerability Management (UVM) Lifecycle model, a security assurance process, which focuses on unreported vulnerabilities. The UVM model helps …
Codenomicon released its Unknown Vulnerability Management (UVM) Lifecycle model, a security assurance process, which focuses on unreported vulnerabilities. The UVM model helps …
Multiple vulnerabilities in Siemens FactoryLink can be exploited by malicious people to disclose potentially sensitive information, cause a Denial of Service, and compromise a …
A currently unpatched XSS vulnerability in the mobile API version of Facebook is currently being exploited to post messages to users’ Walls, which serve as a gateway to …
Discovering that your site is chock full of security vulnerabilities must be embarrassing for any company, but is surely doubly so when you are a company offering to secure …
Some vulnerabilities have been reported in the Linux Kernel. These can be exploited by malicious, local users to cause a Denial of Service and potentially gain escalated …
It is safe to say that the existence of SCADA (supervisory control and data acquisition) systems was a fact unknown to many before the advent of the Stuxnet worm, and not many …
Apple today released Mac OS X 10.6.7 which increases the stability, compatibility, and security of your Mac. AirPort A divide by zero issue existed in the handling of Wi-Fi …
In an open letter, Art Coviello, the executive chairman of RSA (the security division of EMC), made public the fact that the company has suffered a breach and data loss …
EMC Avamar is a backup and recovery solution that utilizes data deduplication technology to identify redundant data at the source, minimizing backup data before it is sent …
PHP 5.3.6 focuses on improving the stability of the PHP 5.3.x branch with over 60 bug fixes, some of which are security related. Security enhancements and fixes Enforce …
A weakness and multiple vulnerabilities have been discovered in LotusCMS, which can be exploited by malicious users to disclose sensitive information and compromise a …
A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems (Adobe Flash Player …