Similar Articles |
|
InternetNews September 17, 2010 |
Are PC Security Flaws on the Wane? New survey from HP Tipping Point finds that 2006 was a high water mark for security vulnerabilities, and that the sheer volume of flaws has since been on the decline. |
InternetNews July 21, 2010 |
Mozilla Patches 14 Firefox Security Flaws Ahead of the annual Black Hat security conference, Mozilla issues its largest patch for the open source Firefox 3.6 browser, fixing 14 security vulnerabilities. |
InternetNews July 26, 2010 |
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. |
InternetNews July 28, 2010 |
Enterprise Wi-Fi users at Risk? Although Cisco downplays the danger, researchers at the Black Hat security conference discussed a potential security vulnerability in Cisco 1200-series wireless access points. |
InternetNews August 20, 2010 |
Google Nabs 11 Chrome Vulnerabilities The company shuts down a number of potentials security holes while paying out more than $10,000 to third-party researchers who discovered the flaws. |
InternetNews July 7, 2010 |
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. |
InternetNews August 2, 2010 |
Google Hacking for Enterprise Security: Black Hat At the Black Hat security conference, researchers describe their work expanding on the technique known as Google hacking to leverage the search engine to improve enterprise security. |
InternetNews July 30, 2007 Sean Michael Kerner |
Black Hat Cometh; You Afraid? The Black Hat conference in Las Vegas is a place where bad things are talked about openly and things that we once thought were secure get thrown out the window. |
Science News |
Dyslexia, Learning, And The Brain By Roderick I. Nicolson And Angela J. Fawcett Leading researchers take a theoretical approach to a complex question: What is dyslexia? |
InternetNews August 25, 2010 |
More Security Holes in Software, Fewer Patches According to IBM's X-Force security research group, vulnerabilities are proliferating, and while companies are getting better about reporting those flaws, the number of unpatched problems continues to rise. |
InternetNews July 27, 2010 |
Security Pros Gather For Black Hat Confab Security experts, hackers and media types are filing into Sin City this week for the annual Black Hat USA security conference, a gathering that's endured and generated its share of controversy in the past. |
InternetNews January 11, 2007 Sean Michael Kerner |
Money For Vista, IE Bugs VeriSign's iDefense Labs has kicked off its Vulnerability Contributor Program, a challenge to find remote arbitrary code execution vulnerabilities in Vista and Internet Explorer 7.0. VCP will pay $8,000 for the first six confirmed vulnerabilities. |
InternetNews July 30, 2009 |
Black Hat: Microsoft's Killbit Under the Microscope Researchers roll out a killbit analyzer and take some shots at the software giant, but Microsoft's not worried. |
InternetNews July 6, 2007 Andy Patrizio |
Step Right Up, Get Your Exploits Right Here WabiSabiLabi sets up an eBay for software vulnerabilities. |
InternetNews December 16, 2009 |
Firefox Gets Fixes in Version 3.5.6 Mozilla addresses a handful of security vulnerabilities in its flagship browser. |
InternetNews April 12, 2010 |
HP Completes $2.7 Billion 3Com Acquisition Purchase adds new networking power as HP ramps up to take on Cisco. Among the key assets HP will take over in the $2.7 billion deal are a core networking switch, security division and an entree into the Chinese market. |
InternetNews March 31, 2005 Jim Wagner |
Mozilla Community Cashing in on Bug Bounties The open source organization has handed out $6,000 to people who have discovered security flaws in Mozilla products. |
InternetNews September 3, 2004 Ryan Naraine |
Big Blue Plugs DB2 Holes IBM has released a pair of "FixPaks" to plug security holes in its DB2 Universal Database product after researchers discovered multiple code execution vulnerabilities. |
InternetNews December 17, 2010 |
Metasploit 3.5.1 Targets Cisco Networking Gear With its latest update, networking security testbed Metasploit adds features targeting Cisco's networking equipment in a new attack approach exploiting decade-old vulnerabilities. |
InternetNews March 26, 2010 |
Cisco Targets Security Threats With IOS Update Cisco issues seven security warnings relating to vulnerabilities in its IOS operating system, which powers many of its routers and switches. |
InternetNews August 17, 2010 |
HP Buys Fortify to Boost Application Code Analysis With an eye toward merging static and dynamic code analysis tools, HP snaps up a partner. |
InternetNews March 18, 2009 Sean Michael Kerner |
PWN2OWN: What's a Vulnerability Worth? Hacking contest puts cash behind exploiting security holes. But the goal isn't to take advantage of users - it's to help them. |
InternetNews September 6, 2007 Sean Michael Kerner |
Flaw Still Shadows Firefox Already fixed twice by Mozilla, security researchers claim Firefox is still vulnerable. |
InternetNews February 25, 2010 |
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. |
InternetNews March 24, 2010 |
Web Browsers in the Cross Hairs at Pwn2Own At CanSecWest, the Pwn2Own contest pits security researchers against supposedly secure Web browsers. Who comes out on top? |
InternetNews March 29, 2011 |
Is McAfee.com Insecure? Security researchers publicly expose vulnerabilities on McAfee's website. |
InternetNews November 11, 2009 |
HP Buys 3Com for $2.7B in Major Networking Play HP said today it plans to buy networking player 3Com in a $2.7 billion deal that aims to turn the hardware giant into a forced to be reckoned with in networking. |
InternetNews March 5, 2004 Ryan Naraine |
HP Plugs 'Critical' Tru64 UNIX Flaws HP has issued a security patch to plug "highly critical" holes in its HP Tru64 Unix operating system with a warning that a successful exploit could lead to system takeover. |
InternetNews October 21, 2010 |
HP Launches Networking Certification Program In an effort to modernize the current field of networking certifications, HP is offering a new program called ExpertONE focused on converged infrastructure. |
InternetNews August 4, 2009 |
Mozilla Patches Firefox for Black Hat Flaws Firefox 3.5.2 and 3.0.13 fix issues new and old in the open source browser. |
InternetNews January 13, 2011 |
Google Pays Out Record Bug Bounty for Chrome 8 Google to shell out more than $14,000 in its incentive program for crowd-sourcing the discovery of security vulnerabilities in its Chrome 8 Web browser and operating system. |
InternetNews February 19, 2010 |
Cisco and HP to Sever Partnership As the two tech giants converge as competitors in the server and networking businesses, Cisco says it is cutting off HP as a Certified Channel Partner in April. |
InternetNews June 10, 2010 |
HP Aims to Up Security in Application Development The focus is on stamping out bugs early in the development process. |
InternetNews December 15, 2004 Sean Michael Kerner |
Cisco, HP Join Support Services Cisco Systems and HP extended their global partnership today, one that promises to deliver support services via a single point of contact to enterprises. |
InternetNews July 31, 2007 Sean Michael Kerner |
Surprise! Web Vulnerabilities on The Rise Security analysis vendor Cenzic today issued its second-quarter Application Security Trends report claiming that, once again, vulnerabilities are on the rise. |
InternetNews August 6, 2010 |
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. |
InternetNews January 20, 2011 |
Spam Down, Java Exploits up in 2010: Cisco In its annual security review, Cisco reports that overall spam volumes declined, and Java outpaced Adobe's PDF as a favorite target of cyber-attackers. |
InternetNews September 25, 2006 Ed Sutherland |
Report: Home Users Blind To Hackers According to a new status report from security vendor Symantec, home users are the target of 86 percent of attacks. Financial services ranked second, the target of 84 percent of phishing attempts in the first half of 2006. |
InternetNews July 26, 2010 |
Apple Security Holes Outnumber Windows According to Secunia, the Mac and iPhone maker is at risk from more security holes than other vendors. But Apple faithful don't need to despair just yet. |
Wall Street & Technology April 14, 2006 |
Cover Up Those Holes Businesses continue to struggle with security issues, according to a survey of more than 100 IT and data security professionals in the United States. |
The Motley Fool March 22, 2007 Seth Jayson |
Quick Take: An Apple Smear A high-level counterinsurgency campaign against a couple of security researchers -- if that's what we've got here -- would look like business as usual for Apple. |
Technology Research News March 12, 2003 |
Net has few degrees of separation Researchers have found that the average number of connections needed to get from one point to another in real-world networks like the Internet and social networks is smaller than the number needed for randomly-connected networks. The findings could lead to improved networks. |
InternetNews March 11, 2009 Sean Michael Kerner |
HP's New Flash Security Tool Nears Release After hints at Black Hat, SWFscan is on the horizon. |
The Motley Fool December 20, 2010 Anders Bylund |
HP Sticks Another Thorn in Cisco's Side Clever marketing aside, this upgrade program shows how badly Cisco betrayed its longtime partner. |
InternetNews November 22, 2005 Sean Michael Kerner |
Hackers Change Course A new SANS 2005 Top 20 list of Internet vulnerabilities shows a shift in what attackers are going after. And it's not just operating systems anymore. |
The Motley Fool February 19, 2010 Tim Beyers |
Cisco Tells HP: It's Over Planning to compete with HP for future business, Cisco said it will not renew their systems integrator agreement. |
InternetNews March 10, 2011 |
Pwn2own Hackers Tear Through Safari, IE8 At annual browser hacking competition, participants make short work of a recent version of Apple's Safari browser, while others took on Microsoft's Internet Explorer 8. |
InternetNews May 17, 2011 Sean Michael Kerner |
HP Second Quarter Revenues on the Rise Consumer division drags down results as enterprise and networking businesses continue to grow. |
InternetNews June 5, 2007 Sean Michael Kerner |
Explorer, Firefox Take Heat Security researchers claim a number of zero-day flaws in both Internet Explorer and Mozilla Firefox. |
InternetNews August 2, 2007 Sean Michael Kerner |
Mozilla Puts The Fun in Fuzz Mozilla doesn't want to just make a better browser; it wants to make the Web a safer place for everyone. |