vulnerability
Panda Cloud Internet Protection 3.2 released
Panda Cloud Internet Protection 3.2 includes monitoring and control of P2P protocols, even when encrypted, and protection for exploitable browser vulnerabilities. It also …
Facebook bug compromises top pages
A customer of Sendible, an online marketing service for promoting and tracking brands through the use of social media, e-mail and SMS messaging, has inadvertently discovered a …
Security vendor launches bug bounty
Barracuda Networks announced their Security Bug Bounty Program, an initiative that rewards researchers who identify and report security vulnerabilities in the company’s …
Microsoft November Patch Tuesday bottom line
In the video below, Amol Sarwate, vulnerability labs manager at Qualys discusses this month’s Microsoft Patch Tuesday release. To learn more about patching challenges …
Adobe patches Flash vulnerabilities
Critical vulnerabilities have been identified in Adobe Flash Player 10.1.85.3 and earlier versions for Windows, Macintosh, Linux, and Solaris, and Adobe Flash Player 10.1.95.1 …
New IE 0-day exploit code found in the wild
Exploit code for a previously unknown Internet Explorer zero-day vulnerability that would allow an attacker to perform a remote code execution and install malware on the …
New vulnerability impacts Internet Explorer users
Microsoft is investigating new, public reports of a vulnerability in all supported versions of Internet Explorer. The main impact of the vulnerability is remote code …
Google Android vulnerabilities
A shocking number of high-risk security flaws in Google’s Android smartphone OS have recently been discovered by security firm Coverity. “We found 88 high-risk …
New 0-day flaw in Flash Player exploited in the wild?
Bad news just keep piling on Adobe – it looks like there is a new zero-day vulnerability in their Flash Player that is being exploited in the wild. Its existence is …
iOS security loophole allows access to passcode-protected iPhone
A security hole in Apple iOS 4.1 allows anyone to bypass the passcode screen and access certain functions of the iPhone. To do that, you must hit the “Emergency …
Fabric weaves security into program code
Wouldn’t it be wonderful if we could build security into a program as it is written? This idea spurred a number of researchers from Cornell University to try and develop …
Apple resolves FaceTime security flaw
A flaw in the beta version of Apple’s FaceTime for Mac which was presented on Wednesday, has apparently allowed potential hackers to gain access to and modify a …
Featured news
Sponsored
Don't miss
- 100+ domains seized to stymie Russian Star Blizzard hackers
- October 2024 Patch Tuesday forecast: Recall can be recalled
- Best practices for implementing threat exposure management, reducing cyber risk exposure
- Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
- CUPS vulnerabilities could be abused for DDoS attacks