Email Alerts
-
HP customers vulnerable to software update tool flaw
Several flaws in HP Software Update could allow an attacker to read system information or gain access to a machine. Article | 29 Apr 2008
-
New hacking technique exploits common NULL programming error
A researcher has discovered a new hacking technique that exploits a programming vulnerability common in many applications. Article | 21 Apr 2008
-
Shrewd attackers bypass old security defenses with Web attacks
Cybercriminals are conducting Web-based attacks to bypass traditional protection technologies. With most security vendors unable to solve the problem, companies need to rethink their security strategy. Column | 13 Feb 2008
-
Spam continues surge as spammers become clever in '07
Despite arrests of high profile spammers in 2007, spam continues to plague company servers. Article | 07 Jan 2008
-
Critical security patch for Adobe Flash Player
Adobe Systems Inc. has patched multiple Adobe Flash Player flaws attackers could exploit to hijack computers and cause a variety of damage. Article | 19 Dec 2007
-
Apple updates QuickTime to plug serious flaw
Apple worked quickly to address the zero-day buffer-overflow flaw in its widely used QuickTime media player, becuase exploit code surfaced late last month. Article | 14 Dec 2007
-
Microsoft warns of Windows zero-day
Attackers could exploit a zero-day flaw in Windows' Web Proxy Auto-Discovery (WPAD) feature to access sensitive data, Microsoft warned Monday. Article | 04 Dec 2007
-
IBM Lotus Notes critical flaw affects file viewing
Attackers can exploit the flaw remotely to crash the application or gain access to a victim's machine. Article | 27 Nov 2007
-
Apple releases QuickTime security fix
The popular QuickTime multimedia application is afflicted with at least seven security flaws, but Apple has released an update to fix them. Article | 05 Nov 2007
-
New attack methods target Web 2.0, VoIP
Researchers have found new evidence that attackers are targeting Web 2.0 applications and VoIP with increased vigor. Companies are ill-prepared to meet the threat, they say. Article | 17 Oct 2007
Security Management Strategies for the CIO