Email Alerts
-
SANS researcher: Implement every Java security fix
Malware writers see Java as a soft target because enterprises are not keeping it patched. News | 11 Nov 2010
-
Adobe warns of Flash vulnerability
Adobe warned of ongoing attacks targeting a critical vulnerability in its Flash Player on its Reader software. News | 29 Oct 2010
-
Adobe warns of critical Shockwave Flash Player zero-day
The vulnerability could be exploited by an attacker to cause a crash and take control of a victim's system. Article | 22 Oct 2010
-
Adobe fixes Flash Player zero-day vulnerability
The critical Flash Player flaw is being actively exploited in the wild on Windows systems. Article | 20 Sep 2010
-
Adobe fixes bevy of critical Shockwave Player vulnerabilities
The popular browser component had 20 holes, 18 considered critical, enabling an attacker to execute code remotely, gain access to files and take control of a victim's computer. Article | 25 Aug 2010
-
HP to acquire Fortify Software for secure software development
Source code analysis vendor Fortify Software will eventually be integrated into HP's Business Technology Optimization application portfolio. Analysts say acquisition was expected. Article | 17 Aug 2010
-
Reader overflow vulnerability to get emergency Adobe patch
Security updates from Adobe will patch a critical flaw that was discussed at last week's Black Hat conference. Article | 05 Aug 2010
-
Adobe vulnerability management: Arkin on the new threat landscape
LAS VEGAS -- Brad Arkin and Adobe Systems Inc. have had to endure a lot of ribbing at Black Hat 2010. Arkin, senior director of product security and privacy ... Interview | 30 Jul 2010
-
Critical Adobe Reader, Acrobat update due today
A critical, out-of-cycle patch is set to repair a serious flash vulnerability in the software that is being actively targeted by attackers. Article | 29 Jun 2010
-
Adobe focuses on secure software development lifecycle
With its popular software increasingly targeted by hackers, Adobe has stepped up efforts to secure its applications. Article | 22 Jun 2010
Security Management Strategies for the CIO