Email Alerts
-
Flaws affect F-Secure AV products
The security vendor has addressed a number of vulnerabilities in its Windows and Linux antivirus product that could be exploited by attackers to escape detection, cause a denial of service or launch malicious code. Article
-
Security Bytes: New flaws affect Cisco, Check Point
Cisco confirms a security hole in its IOS HTTP Server while Symantec warns of a flaw in the Check Point VPN-1 SecureClient application. Article
-
How to tame Google Desktop
Although not classified as spyware, if left unmanaged and unmonitored desktop search engines, like Google Desktop, can introduce serious security concerns. This tip examines these risks and explains how to block or secure Google Desktop in the enterp... Tip
-
Windows Plug and Play has a new enemy
Mocbot targets an already-exploited security hole Microsoft patched in August. Could it be the next Zotob? Article
-
Powerful payloads: The evolution of exploit frameworks
Attackers have new tools to launch faster, more powerful attacks. Contributor Ed Skoudis offers up some examples, some of which are very clever and very evil. Article
-
Security attention shifts to critical IE, Adobe flaws
Attack-weary users now have fresh flaws in Internet Explorer and Adobe to worry about. Microsoft has workarounds. Adobe has patches. Article
-
Security Bytes: Flaws plague Adobe Reader, Acrobat
Also: Bagle/Mitglieder targets AV programs; consumers and merchants sue credit card companies over data theft; IBM, Linux face new flaws; and CA buys security firm. Article
-
RealPlayer users urged to patch
New patches fix two security holes in widely used RealPlayer. An attacker who exploits them could launch malicious code. Article
-
Compressed files strike another blow to AV
The "alternative" .rar files are picking up where popular .zip files left off as attack vectors. Article
-
Fixes for ReviewPost, PhotoPost
Updates for ReviewPost and PhotoPost fix several security holes that could be exploited for cross-site scripting and SQL injection attacks. Article
Security Management Strategies for the CIO