vulnerability
VLC 1.1.7 fixes security issue
VideoLAN unveiled VLC 1.1.7, a security update on 1.1.6. When parsing an invalid MKV (Matroska or WebM) file, input validation are insufficient. If successful, a malicious …
Could a vulnerability tax spur vendors to improve security?
He has recently been appointed as Apple’s global director of security and he is expected to begin his work in March, but former National Security Agency cryptographer …
Vulnerabilities in Cisco WebEx conferencing applications
Core Security Technologies disclosed stack overflow vulnerabilities affecting the Cisco WebEx applications used to conduct Web-based video conferencing. They identified two …
Microsoft Windows MHTML XSS vulnerability
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting (XSS) attacks, according to Secunia. The …
Multiple vulnerabilities in Symantec products
Multiple vulnerabilities have been reported in Symantec products, which can be exploited by malicious people to cause a Denial of Service and compromise a vulnerable system, …
The vulnerability species: Origin and evolution
There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …
ICQ’s critical flaw allows attackers to serve malicious software update
ICQ – the popular instant messaging application – has a gaping security hole that can allow attackers to execute malicious code on the targeted system, says …
Vulnerabilities in the Boonana Trojan increase the danger
First spotted almost three months ago, the Boonana Trojan stood out because of its capability to infect both computer running Windows and those running Mac OS X. The Trojan …
Multiple vulnerabilities in Cisco IOS
Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS, …
Third-party software responsible for most vulnerabilities
Most people owning a PC are familiar with Microsoft’s patching process – it’s easy and it’s there. For a lot of them, it also gives the impression that …
Microsoft patches three Windows vulnerabilities
Today Microsoft released two security bulletins, one rated Critical and one rated Important, to address a total of three vulnerabilities in Microsoft Windows and Windows …
Database activity monitoring and vulnerability assessment
Sentrigo released Hedgehog Enterprise 4.1, a fully integrated database activity monitoring and vulnerability assessment solution. Hedgehog DBscanner now conducts checks for …
Featured news
Resources
Don't miss
- Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
- Building a reasonable cyber defense program
- Attackers are probing Palo Alto Networks GlobalProtect portals
- Why global tensions are a cybersecurity problem for every business
- How to build an effective cybersecurity simulation