Email Alerts
-
Why should we place data files on a separate partition than the OS?
You may have always been taught to install applications on a different partition than the OS, but do you actually know why? Ask the Expert
-
Adobe updates ColdFusion, JRun, Flex
Application vendor focuses on vulnerabilities in its Web application development tools. Article
-
Serious Adobe Flash flaw being exploited
Purewire principal researcher Paul Royal explains the ins and outs of the latest Adobe Flash vulnerability. Adobe said it plans to fix the flaw by July 30. News
-
Adobe issues security advisory for Flash zero-day flaw
A serious flaw in Adobe Flash Player could enable an attacker to take complete control of a computer. Security firms are reporting limited attacks in the wild. Article
-
Adobe acknowledges serious Flash zero-day vulnerability
UPDATED: Adobe Systems Inc. said it was investigating a potential Adobe Flash error. Symantec discovered attacks exploiting an error in a Flash component. Article
-
How to manage patches for Adobe
If you're dealing with a continuous flow of patches, particularly from Adobe, application security expert Michael Cobb feels your pain. Ask the Expert
-
When to use the service features of the Metasploit hacking tool
In this expert response, Michael Cobb explains why offloading resource-intensive penetration testing tasks to Metasploit may be an attractive option. Ask the Expert
-
Adobe ColdFusion websites being compromised
Popular websites run by Simon & Schuster, Crayola, FAO Schwarz and others could be at risk. A flaw in the ColdFusion rich text editor is being actively exploited, Adobe says. Article
-
Adobe fixes critical Shockwave Flash Player flaw
Adobe released an update to its Shockwave Flash Player to repair a critical flaw that could allow an attacker to take complete control of a system. Article
-
Adobe issues first quarterly patch release fixing 13 flaws
Adobe's first quarterly security patch release includes fixes for critical vulnerabilities in Adobe Reader and Adobe Acrobat. Article
Security Management Strategies for the CIO