Please turn on your JavaScript for this page to function normally.
VLC 1.1.7 fixes security issue

VideoLAN unveiled VLC 1.1.7, a security update on 1.1.6. When parsing an invalid MKV (Matroska or WebM) file, input validation are insufficient. If successful, a malicious …

Could a vulnerability tax spur vendors to improve security?

He has recently been appointed as Apple’s global director of security and he is expected to begin his work in March, but former National Security Agency cryptographer …

Vulnerabilities in Cisco WebEx conferencing applications

Core Security Technologies disclosed stack overflow vulnerabilities affecting the Cisco WebEx applications used to conduct Web-based video conferencing. They identified two …

Microsoft Windows MHTML XSS vulnerability

A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting (XSS) attacks, according to Secunia. The …

Multiple vulnerabilities in Symantec products

Multiple vulnerabilities have been reported in Symantec products, which can be exploited by malicious people to cause a Denial of Service and compromise a vulnerable system, …

The vulnerability species: Origin and evolution

There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …

ICQ’s critical flaw allows attackers to serve malicious software update

ICQ – the popular instant messaging application – has a gaping security hole that can allow attackers to execute malicious code on the targeted system, says …

Vulnerabilities in the Boonana Trojan increase the danger

First spotted almost three months ago, the Boonana Trojan stood out because of its capability to infect both computer running Windows and those running Mac OS X. The Trojan …

Multiple vulnerabilities in Cisco IOS

Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …

Third-party software responsible for most vulnerabilities

Most people owning a PC are familiar with Microsoft’s patching process – it’s easy and it’s there. For a lot of them, it also gives the impression that …

Microsoft patches three Windows vulnerabilities

Today Microsoft released two security bulletins, one rated Critical and one rated Important, to address a total of three vulnerabilities in Microsoft Windows and Windows …

Database activity monitoring and vulnerability assessment

Sentrigo released Hedgehog Enterprise 4.1, a fully integrated database activity monitoring and vulnerability assessment solution. Hedgehog DBscanner now conducts checks for …

Don't miss

Cybersecurity news