Similar Articles |
|
InternetNews July 26, 2010 |
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. |
InternetNews January 4, 2007 Ed Sutherland |
Vista Exploit Looking For Achilles' Heel First Vista exploit could mean lasting problems for Microsoft, according to a security vendor. |
InternetNews August 3, 2010 |
Tech Firms Split on Paying for Security Flaws Some major IT firms have made it a standard practice to pay security researchers for bringing vulnerabilities to their attention, while others have a strict prohibition against it. What accounts for the divide? |
InternetNews March 25, 2010 |
IE8, Firefox, Safari, and iPhone All Get Pwned As expected, security researchers found exploits in all of the targeted platforms in a contest that put browser security to the test. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
InternetNews August 6, 2010 |
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
InternetNews August 20, 2010 |
Google Nabs 11 Chrome Vulnerabilities The company shuts down a number of potentials security holes while paying out more than $10,000 to third-party researchers who discovered the flaws. |
InternetNews September 17, 2010 |
Are PC Security Flaws on the Wane? New survey from HP Tipping Point finds that 2006 was a high water mark for security vulnerabilities, and that the sheer volume of flaws has since been on the decline. |
InternetNews October 6, 2006 Ed Sutherland |
Microsoft Plans Nearly Dozen Patches Critical vulnerabilities in Microsoft's Windows operating system and the widely-used Office application suite are part of 11 patches slated to be released next week, according to a Microsoft. |
InternetNews January 11, 2007 Sean Michael Kerner |
Money For Vista, IE Bugs VeriSign's iDefense Labs has kicked off its Vulnerability Contributor Program, a challenge to find remote arbitrary code execution vulnerabilities in Vista and Internet Explorer 7.0. VCP will pay $8,000 for the first six confirmed vulnerabilities. |
InternetNews May 22, 2006 Ed Sutherland |
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. |
PC World November 2004 Harry McCracken |
Is This Any Way to Fix Security Holes? How today's software patching process actually helps hackers do their job. |
PC Magazine June 22, 2005 Ryan Naraine |
The Lookout: Firefox Exploit Sends Mozilla Scrambling In early May, for the fourth time in three months, major security flaws in the Firefox Web browser pushed volunteers at the Mozilla Foundation into damage-control mode. |
InternetNews March 29, 2011 |
Is McAfee.com Insecure? Security researchers publicly expose vulnerabilities on McAfee's website. |
InternetNews April 16, 2010 |
Apple Patches Pwn2own OS Threat After a security researcher demonstrated a security flaw in Apple's Safari browser running on its Snow Leopard operating system, the company has issued a fix, providing clues as to the nature of the threat. |
InternetNews April 3, 2008 Sean Michael Kerner |
Are Security Researchers Targeting QuickTime? Apple fixes 11 security flaws as QuickTime woes continue, though the end may be in sight. |
InternetNews March 13, 2006 Sean Michael Kerner |
QuickTime, iTunes Users at Risk (Again)? Apple QuickTime and iTunes users may yet again be at risk from a currently unpatched exploit. There is a pair of overflow conditions that could enable a malicious user to execute arbitrary code. |
InternetNews March 10, 2011 |
Pwn2own Hackers Tear Through Safari, IE8 At annual browser hacking competition, participants make short work of a recent version of Apple's Safari browser, while others took on Microsoft's Internet Explorer 8. |
InternetNews July 9, 2010 |
Say What? The Week's Top Five IT Quotes The technology world's most quotable quips and comments from around the Web. |
InternetNews January 3, 2011 |
Fuzzer Finds IE Vulnerabilities A Google researcher makes his "cross fuzz" tool for identifying browser vulnerabilities publicly available. |
InternetNews October 23, 2008 Andy Patrizio |
Microsoft Rushes Out Urgent Windows Fix Microsoft is rushing out an emergency security fix outside of its regular patch schedule for Windows users. |
InternetNews September 3, 2004 Ryan Naraine |
Big Blue Plugs DB2 Holes IBM has released a pair of "FixPaks" to plug security holes in its DB2 Universal Database product after researchers discovered multiple code execution vulnerabilities. |
InternetNews September 21, 2010 |
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. |
InternetNews August 19, 2004 Ryan Naraine |
IE Drag-and-Drop Flaw Warning Researchers warn that fully patched Internet Explorer users remain at risk of PC takeover attacks. |
InternetNews July 6, 2007 Andy Patrizio |
Step Right Up, Get Your Exploits Right Here WabiSabiLabi sets up an eBay for software vulnerabilities. |
InternetNews June 11, 2010 |
Microsoft Alerts on Windows XP Vulnerability A new security flaw has been discovered in the popular but aging OS's Help and Support Center. |
InternetNews July 27, 2010 |
Security Pros Gather For Black Hat Confab Security experts, hackers and media types are filing into Sin City this week for the annual Black Hat USA security conference, a gathering that's endured and generated its share of controversy in the past. |
CIO October 1, 2003 Art Jahnke |
Should Software Vulnerabilities Be Posted Online? Readers weigh in with their opinions on this thorny issue. |
BusinessWeek August 21, 2006 Steve Hamm |
Heading Off The Hackers Microsoft pulls out the stops to boost security. |
InternetNews September 7, 2010 |
Researcher Unearths Microsoft Zero-Day Flaw A security researcher who also happens to be a Google employee is warning of a new zero-day exploit affecting Internet Explorer 8 that could automatically send out unintended tweets. |
InternetNews January 13, 2011 |
Google Pays Out Record Bug Bounty for Chrome 8 Google to shell out more than $14,000 in its incentive program for crowd-sourcing the discovery of security vulnerabilities in its Chrome 8 Web browser and operating system. |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
InternetNews February 3, 2010 |
At Black Hat, IE Under Attack (Again) Older vulnerabilities resurface in Internet Explorer, as one researcher warns how attackers can turn IT into a "public file server". |
InternetNews February 25, 2010 |
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. |
InternetNews December 26, 2006 Ed Sutherland |
Vista Security Takes a Hit Vista is proving not to be as unsinkable as Microsoft claimed. |
InternetNews November 23, 2009 |
Zero-Day Exploit a Threat to IE6 & 7 Browsers? Another zero-day hole emerges in key Microsoft software. |
InternetNews May 12, 2010 |
Firm Finds Flaws in Popular Antivirus Software Putting the security software offerings from 35 different vendors through their paces, researchers at Matousec conclude that all are susceptible to an exploit that could hobble Windows-based devices. |
InternetNews February 18, 2009 Richard Adhikari |
Hackers Target IE 7 Browser Again Users who failed to patch their computers after Microsoft released its monthly Patch Tuesday update last week could be in trouble - an Internet Explorer browser vulnerability for which the patch was sent out is under attack again. |
InternetNews March 15, 2010 |
Microsoft Developing Patch for IE Zero-Day Flaw Microsoft scrambles to deliver a workaround to protect against a zero-day exploit in its Internet Explorer browser, says it is developing a more permanent patch. |
InternetNews May 8, 2006 David Miller |
The Surge in Mac Attacks Just as Apple Computer launched a new ad touting OSX's resilience against viruses, the Macintosh operating system and applications have come under fire for harboring serious security flaws. |
InternetNews July 21, 2010 |
Mozilla Patches 14 Firefox Security Flaws Ahead of the annual Black Hat security conference, Mozilla issues its largest patch for the open source Firefox 3.6 browser, fixing 14 security vulnerabilities. |
InternetNews December 31, 2009 |
VoIP Security Issues on the Rise McAfee said its latest research found almost 60 vulnerabilities in VoIP products. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
InternetNews March 25, 2008 Sean Michael Kerner |
Report: 90% of Web Sites Vulnerable to Hackers New study claims Cross-Site Scripting attacks are all over the place. Should we be afraid? |
InternetNews March 18, 2009 Sean Michael Kerner |
PWN2OWN: What's a Vulnerability Worth? Hacking contest puts cash behind exploiting security holes. But the goal isn't to take advantage of users - it's to help them. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
InternetNews August 12, 2005 Tim Gray |
Windows Exploit Code Online The exploit code can lead to a remote system compromise, where an attacker can take control of an affected computer. A patch for this code is available online. |
The Motley Fool March 22, 2007 Seth Jayson |
Quick Take: An Apple Smear A high-level counterinsurgency campaign against a couple of security researchers -- if that's what we've got here -- would look like business as usual for Apple. |