Please turn on your JavaScript for this page to function normally.
Vulnerabilities in the Boonana Trojan increase the danger

First spotted almost three months ago, the Boonana Trojan stood out because of its capability to infect both computer running Windows and those running Mac OS X. The Trojan …

Multiple vulnerabilities in Cisco IOS

Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …

Third-party software responsible for most vulnerabilities

Most people owning a PC are familiar with Microsoft’s patching process – it’s easy and it’s there. For a lot of them, it also gives the impression that …

Microsoft patches three Windows vulnerabilities

Today Microsoft released two security bulletins, one rated Critical and one rated Important, to address a total of three vulnerabilities in Microsoft Windows and Windows …

Database activity monitoring and vulnerability assessment

Sentrigo released Hedgehog Enterprise 4.1, a fully integrated database activity monitoring and vulnerability assessment solution. Hedgehog DBscanner now conducts checks for …

Mono ASP.NET source code disclosure vulnerability

Mono is an open source, cross-platform, implementation of C# and the CLR that is binary compatible with Microsoft.NET. A vulnerability has been reported in Mono, which can be …

Who profits on vulnerabilities for sale?

The number of software vulnerabilities discovered during 2010 may be smaller than that of those discovered the previous year, but they still bring money to its discoverers. …

Microsoft to patch three vulnerabilities in Windows

Next week’s January’s security bulletins will contain two bulletins addressing three vulnerabilities in Windows. As usual, the bulletin release is scheduled for …

Exploit code for critical MS Office flaw exploit found in the wild

A critical vulnerability in the way Microsoft Office handles RTF which can allow an attacker to remotely execute arbitrary code on the victim’s computer has been by …

Critical vulnerability in ImgBurn

A vulnerability has been discovered in ImgBurn, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The vulnerability is …

All versions of Internet Explorer under threat

Today Microsoft released a new security advisory to help protect users from a vulnerability affecting Internet Explorer versions 6, 7, and 8. Exploiting this vulnerability …

OpenBSD headman believes contractor tried to insert backdoors

Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …

Don't miss

Cybersecurity news