MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
January 12, 2009
Richard Adhikari
Avoiding the Most Common Programming Errors These mistakes show that the bad guys aren't necessarily skilled as they are simply exploiting your errors. mark for My Articles similar articles
InternetNews
January 14, 2009
Richard Adhikari
New York Plans Application Security Program Developers must straighten up and fly right if they want to do business with the Empire State. mark for My Articles similar articles
InternetNews
November 27, 2007
Sean Michael Kerner
SANS: Zero-Day Exploits on The Decline Latest Top 20 Vulnerabilities release shows a decrease in actual zero-day attacks, but that's not necessarily a good thing. mark for My Articles similar articles
InternetNews
May 1, 2006
David Miller
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. mark for My Articles similar articles
InternetNews
November 16, 2006
Sean Michael Kerner
Automated Patching Helping Zero-Day Exploits Latest SANS Institute top 20 list puts IE and Office squarely in hackers cross hairs. Are efforts to protect them fueling the rise? mark for My Articles similar articles
InternetNews
July 27, 2009
Finding Linux Bugs Before they Become Exploits The story of how a Linux exploit actually wasn't, thanks to some static code analysis. mark for My Articles similar articles
InternetNews
July 31, 2006
Sean Michael Kerner
A New Open Source Approach to Weakness Fortify's Seven Pernicious Kingdoms is a new way to categorize Web vulnerabilities. mark for My Articles similar articles
InternetNews
July 31, 2007
Sean Michael Kerner
Surprise! Web Vulnerabilities on The Rise Security analysis vendor Cenzic today issued its second-quarter Application Security Trends report claiming that, once again, vulnerabilities are on the rise. mark for My Articles similar articles
InternetNews
November 22, 2005
Sean Michael Kerner
Hackers Change Course A new SANS 2005 Top 20 list of Internet vulnerabilities shows a shift in what attackers are going after. And it's not just operating systems anymore. mark for My Articles similar articles
InternetNews
March 31, 2011
Report: Nearly Half of Vulnerabilities Left Unpatched IBM's X-Force 2010 Trend and Risk Report details a 27 percent rise in vulnerabilities, with nearly half left unpatched by year's end. mark for My Articles similar articles
InternetNews
December 1, 2005
Sean Michael Kerner
Backup Software Under Attack A SANS report on top security vulnerabilities finds that backup and recovery software has become a favorite target of hackers. mark for My Articles similar articles
InternetNews
June 10, 2010
HP Aims to Up Security in Application Development The focus is on stamping out bugs early in the development process. mark for My Articles similar articles
PC Magazine
July 13, 2004
Cade Metz
Self-Writing Software With intentional programming, everyone's a developer. mark for My Articles similar articles
InternetNews
July 6, 2007
Andy Patrizio
Step Right Up, Get Your Exploits Right Here WabiSabiLabi sets up an eBay for software vulnerabilities. mark for My Articles similar articles
InternetNews
March 29, 2011
Is McAfee.com Insecure? Security researchers publicly expose vulnerabilities on McAfee's website. mark for My Articles similar articles
InternetNews
May 22, 2006
Ed Sutherland
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. mark for My Articles similar articles
Bank Technology News
November 2007
Developers Face Secure Coding Exams The Secure Programming Council is a 40-organization board that's establishing "essential skills" standards and exams in a variety of programming languages. mark for My Articles similar articles
InternetNews
July 25, 2005
Sean Michael Kerner
SANS: No Safety From Vulnerabilities IE vulnerabilities still abound, but Apple, Mozilla and Real Player users have little to gloat about. mark for My Articles similar articles
InternetNews
January 4, 2006
Sean Michael Kerner
CERT's Best-Worst Vulns of 2005 Though there were more reported vulnerabilities, Linux is still seen as likely more secure than Windows. mark for My Articles similar articles
InternetNews
February 8, 2006
Sean Michael Kerner
Java Users at Risk 'Highly critical' vulnerabilities affect older versions of the Java Runtime Environment. mark for My Articles similar articles
InternetNews
March 25, 2008
Sean Michael Kerner
Report: 90% of Web Sites Vulnerable to Hackers New study claims Cross-Site Scripting attacks are all over the place. Should we be afraid? mark for My Articles similar articles
InternetNews
April 20, 2004
Ryan Naraine
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. mark for My Articles similar articles
InternetNews
June 13, 2006
Andy Patrizio
8 'Critical' Updates in Microsoft's Monthly Patch Patches to Windows, Internet Explorer and Outlook close a number of backdoors and exploits. mark for My Articles similar articles
InternetNews
April 5, 2007
Andy Patrizio
Microsoft Prepares Five Fixes But Has More To Do Four Windows bulletins to be issued, but Office vulnerabilities remain unpatched. mark for My Articles similar articles
InternetNews
December 8, 2006
Sean Michael Kerner
Keeping an Eye Out For The Zero Day Security firm eEye Research this week launched its Zero Day Tracker as an effort to help the broader IT community track zero-day vulnerabilities. mark for My Articles similar articles
InternetNews
January 4, 2007
Ed Sutherland
Vista Exploit Looking For Achilles' Heel First Vista exploit could mean lasting problems for Microsoft, according to a security vendor. mark for My Articles similar articles
InternetNews
August 12, 2005
Tim Gray
Windows Exploit Code Online The exploit code can lead to a remote system compromise, where an attacker can take control of an affected computer. A patch for this code is available online. mark for My Articles similar articles
InternetNews
February 13, 2007
Andy Patrizio
Patch Day Yields a Dozen New Fixes From Microsoft Half of the fixes from Microsoft are non-OS related, including one embarrassing vulnerability. mark for My Articles similar articles
InternetNews
April 28, 2004
Paul Shread
Onaro Seeks to Make SANs Work Better Storage area networks can be complex and unwieldy, but start-up Onaro hopes to help make living with SANs a bit simpler with its SANscreen Predictive Change Management software. mark for My Articles similar articles
InternetNews
October 14, 2008
Sean Michael Kerner
Microsoft Rates Patched Flaws by Exploitability Patch Tuesday addresses 20 vulnerabilities, while Microsoft for the first time reveals its take on how exploitable each may be. mark for My Articles similar articles
InternetNews
July 18, 2007
Sean Michael Kerner
Google's Black Box Lemon Google, the company's security team is developing a black box fuzzing tool called Lemon, which is intended to automatically find XSS problems in applications. mark for My Articles similar articles
InternetNews
September 23, 2004
Ryan Naraine
Exploits Circulating for JPEG Flaw Just eight days after Microsoft released a fix for a "critical" flaw in the way JPEG files are processed, researchers have discovered proof-of-concept exploit code that is targeting unpatched machines. mark for My Articles similar articles
InternetNews
September 17, 2010
Are PC Security Flaws on the Wane? New survey from HP Tipping Point finds that 2006 was a high water mark for security vulnerabilities, and that the sheer volume of flaws has since been on the decline. mark for My Articles similar articles
Job Journal
March 27, 2011
Andy West
Computer Programmers Know the Code for Career Success Many IT professionals enjoy computer programming for its physical, hands-on approach to problem solving. Do you have what it takes to earn a degree in this essential profession? mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
InternetNews
May 8, 2006
David Miller
The Surge in Mac Attacks Just as Apple Computer launched a new ad touting OSX's resilience against viruses, the Macintosh operating system and applications have come under fire for harboring serious security flaws. mark for My Articles similar articles
T.H.E. Journal FYI - PatchManagement.org PatchManagement.org is designed to help IT network managers, system administrators and security professionals better understand patch management and computer security vulnerabilities. mark for My Articles similar articles
InternetNews
March 16, 2004
Sharon Gaudin
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. mark for My Articles similar articles
InternetNews
February 25, 2010
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. mark for My Articles similar articles
BusinessWeek
July 25, 2005
Steve Hamm
Home Is Where The Work Is The latest data from the Bureau of Labor Statistics contain a pleasant surprise: Software writers with solid skills are finding plenty of jobs stateside. mark for My Articles similar articles
InternetNews
March 21, 2007
Andy Patrizio
Surprise, Microsoft Listed as Most Secure OS Microsoft has the fewest holes and was fastest at plugging them, according to Symantec's security report. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
InternetNews
December 6, 2006
Ed Sutherland
Don't Open That Word File, Microsoft Warns A new Word vulnerability targets Windows and Mac users, according to Microsoft. mark for My Articles similar articles
InternetNews
October 11, 2004
Ryan Naraine
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. mark for My Articles similar articles
InternetNews
July 26, 2006
Ed Sutherland
Exploits Fish For Unpatched PCs Security vendor Symantec alerted customers to two exploits using already-patched vulnerabilities. mark for My Articles similar articles
InternetNews
August 27, 2009
IBM's X-Force Report Praises Sun for Fast Fixes Security report on trends in vulnerabilities, threats, spam, and phishing finds Sun has passed Microsoft in terms of reporting and fixing OS problems. mark for My Articles similar articles
CIO
May 15, 2003
Scott Berinato
The Bugs Stop Here Don't blame Microsoft. Don't blame the hackers. Blame yourself for insecure software. Better yet, stop blaming and start moving toward operational excellence. mark for My Articles similar articles
InternetNews
July 7, 2004
Susan Kuchinskas
Coding Experience Not Necessarily Required Can new GUI development tools make this generation of coders obsolete? mark for My Articles similar articles
InternetNews
March 2, 2011
Firefox Security Updated Before PWN2OWN On the eve of high-profile hack-fest PWN2OWN, Mozilla updates Firefox to address several security vulnerabilities, just as Google did earlier this week. mark for My Articles similar articles
InternetNews
July 13, 2010
Patch Tuesday Marks the End of XP SP2 Support Microsoft patches two zero-day vulnerabilities this month and finally ends support for Windows XP Service Pack 2 and Windows 2000. mark for My Articles similar articles