vulnerability
LinkedIn security flaws allow account hijacking
LinkedIn users are in danger of having their their account hijacked when accessing it over insecure Wi-Fi networks or public computers, says independent security researcher …
phpMyAdmin redirection weakness and script insertion vulnerability
A weakness and a vulnerability have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to …
GFI LANguard 2011 released
GFI Software launched GFI LANguard 2011, the latest version of the network vulnerability scanning and patch management solution. GFI LANguard 2011 is the first network …
Google to fix Android flaw
Two days ago, a group of German scientists made public the fact that a Google authentication protocol flaw. The flaw makes it possible for malicious individuals to sniff out …
OpenSSL weakness can expose sensitive information
A weakness has been reported in OpenSSL, which can be exploited by malicious people to disclose potentially sensitive information, according to Secunia. The weakness is caused …
New vulnerability reporting framework
The Industry Consortium for Advancement of Security on the Internet (ICASI) published of its Common Vulnerability Reporting Framework (CVRF) Version 1.0. CVRF is an XML-based …
IBM Informix Storage Manager security bypass
A vulnerability has been reported in IBM Informix Storage Manager, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …
Microsoft investigates the current threat landscape
Microsoft published volume 10 of the its Security Intelligence Report (SIRv10) which provides perspectives on software vulnerabilities, software vulnerability exploits, …
Automated solution for patching software vulnerabilities
A universal law enforcement axiom states that criminals prefer to trespass through vulnerable open or unlocked doors or windows. In the IT and software industries, the same …
HP Intelligent Management Center multiple vulnerabilities
Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …
Exponent CMS multiple vulnerabilities
Multiple vulnerabilities have been discovered in Exponent CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks and disclose sensitive …
Microsoft releases two security updates
Microsoft released two security updates addressing one Critical vulnerability in Microsoft Windows and two Important vulnerabilities in Microsoft Office. MS11-035 (Windows) is …
Featured news
Resources
Don't miss
- Windows 10: How to get security updates for free until 2026
- XBOW’s AI reached the top ranks on HackerOne, and now it has $75M to scale up
- Why the SOC needs its “Moneyball” moment
- From posture to prioritization: The shift toward unified runtime platforms
- Why should companies or organizations convert to FIDO security keys?