Category: Widely Deployed Software Affected: Trend Micro Control Manager 5.x View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security
Android Smartphones Rank Highest for Malware Vulnerability: Should You Be Worried?
With Google Android OS currently commanding 52.3% of the worldwide smartphone market, millions of smartphone users own devices running a variation of the popular OS, yet it appears some could be at higher risk for malware than others, as a new report discovered that phones employing an older version…
Microsoft Excel BIFF Record Remote Code Execution Vulnerability
Security Information Risk Compliance Storage Infrastructure Operations Business Continuity Products A-Z Article source: http://www.symantec.com/business/security_response/vulnerability.jsp?bid=23760&om_rssid=sr-advisories View full post on National Cyber Security
(3) HIGH: HP Data Protector Media Operation ‘DBServer.exe’ Buffer Overflow Vulnerability
Category: Widely Deployed Software Affected: HP Data Protector Media Operations Version 6.20 and prior View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security Gergory Evans
(1) HIGH: Microsoft Windows Kernel TrueType Font Parsing Vulnerability
Category: Widely Deployed Software Affected: Windows XP Windows Server 2003 Windows Vista Windows Server 2008 Windows 7 View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security
(2) HIGH: Microsoft Windows Windows Kernel Networking Vulnerability
Category: Widely Deployed Software Affected: Windows Vista Windows Server 2008 Windows 7 View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security Gergory Evans
Cross Site Scripting Vulnerability in Speed Bit Search Engine
Article source: http://feedproxy.google.com/~r/TheHackersNews/~3/ZaeSgybGPqg/cross-site-scripting-vulnerability-in.html View full post on National Cyber Security » Computer Hacking
Secunia brings own spin to vulnerability rewards programs
Another day, another vulnerability reporting reward program. Kinda. Secunia, a vulnerability management vendor from Denmark, is the latest to join the bounty brigade, but it is bringing its spin to the market. Secunia’s new Secunia Vulnerability Coordination Reward Program is another platform for researchers to report software security flaws, but Secunia…
Facebook denies file-sharing vulnerability, then quietly fixes it
Facebook has apparently fixed a vulnerability in its social-networking site after insisting it wasn’t a weakness and didn’t need to be remedied. Nathan Power, who works for the technology consultancy CDW, updated his blog on Tuesday to reflect that the flaw had been fixed. The problem allowed a user to…
Ducati Diavel – power, speed, looks, and a vulnerability lesson for Friday afternoon
Naked Security reader Sean, who has an eye for wacky security holes, recently pointed me at the Ducati Diavel motorcycle Default Ignition Password vulnerability. But is it true? Can you really walk up to Ducati’s latest musclebike and simply ride away? View full post on Naked Security – Sophos View…