vulnerability
Google ups prizes in Chromium bug bounty program
Since a vulnerability rewards program for open source web browser project Chromium was instituted in early 2010, many vulnerabilities have been found and dealt with, and …
Critical vulnerabilities in popular DDoS toolkit exposed
Prolexic Technologies exposed weaknesses in the command and control (C&C) architecture of the Dirt Jumper DDoS Toolkit family that could neutralize would-be attackers. …
Vulnerability disclosure framework for industrial control systems
The Industrial Control Systems Joint Working Group (ICSJWG) published “The Industrial Control Systems Common Vulnerability Disclosure Framework”, which is a …
Is Ubisoft’s DRM browser plugin a rootkit?
An offhand remark made by Google engineer Tavis Ormandy to a post on the Full Disclosure mailing list has sparked anger in the harts of Ubisoft users, as he shared his …
Facebook invites white hats to attack its corporate network
Nearly a year ago, Facebook introduced its bug bounty program, inviting security researchers to poke around the site, discover vulnerabilities that could compromise the …
Scan Android for unpatched vulnerabilities
X-Ray scans your Android device to determine whether there are vulnerabilities that remain unpatched by your carrier. The X-Ray app presents you with a list of vulnerabilities …
Detecting mobile device vulnerabilities using Nessus
This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.
Oracle releases 87 security fixes
The Oracle Critical Patch Update (CPU) Advisory for July 2012 contains 87 security fixes for various products across their portfolio. This advisory is a bit of déjà vu …
Yahoo! closes security hole that led to huge password breach
Yahoo! has patched the security hole that allowed hackers to access some 450,000 email addresses and passwords associated with Yahoo! Contributor Network and ultimately …
Instagram “Friendship Vulnerability” patched
A flaw in the popular Instagram app that allows potential snoopers to add themselves as friends of any Instagram user and, consequently, to access his or hers private …
Microsoft releases nine security bulletins
The Microsoft Security Bulletin Summary for July 2012 contains nine security bulletins addressing 16 CVEs. Three of the bulletins are rated critical and the other six are …
Security vulnerabilities of DVB chipsets
This video from Hack in The Box Amsterdam 2012 focuses on the security of audio and video MPEG streams broadcasted to subscribers via their set-top-boxes by a digital …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance