vulnerability
Free guide: Top 10 reports for managing vulnerabilities
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires …
The dark side of the new Android Market
A new version of the Android Market has just been launched, making it possible for every device owner to look for applications, buy or even remotely install apps to an Android …
Facebook bug allows user data theft via specially crafted websites
A proof-of-concept attack page that exploits a Facebook vulnerability to access a user’s private data has been devised by two students who shared the information with …
Serious jump in new vulnerabilities exploitation
On a typical month, exploit activity falls between 30 percent and 40 percent, according to Fortinet. Half of new vulnerabilities rated as “critical” were targeted …
VLC 1.1.7 fixes security issue
VideoLAN unveiled VLC 1.1.7, a security update on 1.1.6. When parsing an invalid MKV (Matroska or WebM) file, input validation are insufficient. If successful, a malicious …
Could a vulnerability tax spur vendors to improve security?
He has recently been appointed as Apple’s global director of security and he is expected to begin his work in March, but former National Security Agency cryptographer …
Vulnerabilities in Cisco WebEx conferencing applications
Core Security Technologies disclosed stack overflow vulnerabilities affecting the Cisco WebEx applications used to conduct Web-based video conferencing. They identified two …
Microsoft Windows MHTML XSS vulnerability
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting (XSS) attacks, according to Secunia. The …
Multiple vulnerabilities in Symantec products
Multiple vulnerabilities have been reported in Symantec products, which can be exploited by malicious people to cause a Denial of Service and compromise a vulnerable system, …
The vulnerability species: Origin and evolution
There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …
ICQ’s critical flaw allows attackers to serve malicious software update
ICQ – the popular instant messaging application – has a gaping security hole that can allow attackers to execute malicious code on the targeted system, says …
Vulnerabilities in the Boonana Trojan increase the danger
First spotted almost three months ago, the Boonana Trojan stood out because of its capability to infect both computer running Windows and those running Mac OS X. The Trojan …
Featured news
Resources
Don't miss
- How CISOs can balance security and business agility in the cloud
- Orbit: Open-source Nuclei security scanning and automation platform
- The hidden risks of a broken data provisioning system
- Threat actors are using legitimate Microsoft feature to compromise M365 accounts
- North Korean hackers spotted using ClickFix tactic to deliver malware