vulnerability
Multiple vulnerabilities in Symantec products
Multiple vulnerabilities have been reported in Symantec products, which can be exploited by malicious people to cause a Denial of Service and compromise a vulnerable system, …
The vulnerability species: Origin and evolution
There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …
ICQ’s critical flaw allows attackers to serve malicious software update
ICQ – the popular instant messaging application – has a gaping security hole that can allow attackers to execute malicious code on the targeted system, says …
Vulnerabilities in the Boonana Trojan increase the danger
First spotted almost three months ago, the Boonana Trojan stood out because of its capability to infect both computer running Windows and those running Mac OS X. The Trojan …
Multiple vulnerabilities in Cisco IOS
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …
Third-party software responsible for most vulnerabilities
Most people owning a PC are familiar with Microsoft’s patching process – it’s easy and it’s there. For a lot of them, it also gives the impression that …
Microsoft patches three Windows vulnerabilities
Today Microsoft released two security bulletins, one rated Critical and one rated Important, to address a total of three vulnerabilities in Microsoft Windows and Windows …
Database activity monitoring and vulnerability assessment
Sentrigo released Hedgehog Enterprise 4.1, a fully integrated database activity monitoring and vulnerability assessment solution. Hedgehog DBscanner now conducts checks for …
Mono ASP.NET source code disclosure vulnerability
Mono is an open source, cross-platform, implementation of C# and the CLR that is binary compatible with Microsoft.NET. A vulnerability has been reported in Mono, which can be …
Who profits on vulnerabilities for sale?
The number of software vulnerabilities discovered during 2010 may be smaller than that of those discovered the previous year, but they still bring money to its discoverers. …
Microsoft to patch three vulnerabilities in Windows
Next week’s January’s security bulletins will contain two bulletins addressing three vulnerabilities in Windows. As usual, the bulletin release is scheduled for …
Exploit code for critical MS Office flaw exploit found in the wild
A critical vulnerability in the way Microsoft Office handles RTF which can allow an attacker to remotely execute arbitrary code on the victim’s computer has been by …
Featured news
Sponsored
Don't miss
- US exposes scheme enabling North Korean IT workers to bypass sanctions
- The importance of access controls in incident response
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)