Showing results 1 to 20 of 29

Identity Finder Professional Edition

Identity Finder Professional Edition is ideal for individuals and power users looking to protect their sensitive information on personal...

May 22, 2013 By Identity Finder

Dropbox drops the security notification ball, again

Yet another failure to tell users directly about security vulnerabilities highlights the need not just for mandatory data breach notification laws, but mandatory notification of security and privacy risks.

May 7, 2014

Microsoft pulls buggy Exchange Server patch

MS13-061, released on Tuesday to address 3 vulnerabilities in an Oracle component in Exchange Server, causes data to be inaccessible in Exchange Server 2013. Microsoft has pulled the update and released guidance for how to work around the problems it causes.

August 14, 2013 by

Virtual Encrypted Disk

VE-Disk is a small, compact program for creating encrypted virtual disks. It helps you keep your sensitive and vulnerable data and...

October 24, 2005 By Susels

Inside CERT Australia

The Australian Government has a list of software holes that are so sensitive they're kept hidden from the public. These weaknesses are being used by criminals to steal our money and our data. These vulnerabilities are also the bait with which cyber-criminals are caught.

April 10, 2011 by

App servers potential threat to mobile landscape

Compared with Web servers, systems used to run mobile apps require more compute power and give users more access to previously off-limits data, notes security expert, who warns these developments open up more security vulnerabilities.

January 18, 2011 by

Google plugs 'high-risk' holes in Chrome browser

Google has shipped a high-priority Chrome browser patch with fixes for three security vulnerabilities that expose users to cross-site scripting and data theft attacks.Google Chrome's beta and stable channels have been updated to version 1.

January 29, 2009 by

Google patches 'critical' Chrome code execution flaws

The first security patch for Google's new Chrome browser is out, fixing at least two "critical" vulnerabilities that put Windows users at risk of code execution attacks.[ SEE: Google Chrome vulnerable to carpet-bombing flaw ]The patch, which is rolled out automatically via Chrome's auto-update feature, also addresses two additional security vulnerabilities -- the carpet-bombing issue and a denial-of-service flaw that could lead to browser crashes and data loss.

September 8, 2008 by

Ounce Labs finds 2 security vulnerabilities in Spring framework

Code inspector Ounce Labs has identified two vulnerabilities in the open source Spring framework that exposes their enterprise applications to would-be hackers and hijackers.The two issues, ModelView Injection and Data Submission to Non-Editable Fields, affect only the MVC module of the Spring framework, which is used to build enterprise web applications.

July 15, 2008 by

Cisco patches IOS vulnerabilities

Cisco patched multiple vulnerabilities on Wednesday with the most important fixes covering data-link switching, IPv6 and VPN flaws.Among the highest rated patches (all rated 7 or above on a 10 scale):Cisco patched multiple vulnerabilities in the Data-link Switching (DLSw) feature in its IOS.

March 26, 2008 by

Microsoft Excel patch may lead to to calculation errors

Microsoft plugged more than a few vulnerabilities in Excel last week, but the trade off may be calculation errors.Microsoft's Bill Sisk said in a post late Friday following the software giant's latest patch batch:I wanted to let you know that we have updated bulletin MS08-014 to provide additional information on a newly identified issue that causes Microsoft Excel 2003 calculations to return an incorrect result when a Real Time Data source is used.

March 16, 2008 by

Do we need visibility into open source?

The searchlight seems to be shining on open source software more than ever right now asking for visibility into form and function to ensure vulnerabilities and instabilities are avoided. HP’s recent FOSSology announcement claimed to launch an initiative to, “Facilitate the study of free and open source software by providing free data analysis tools.

March 4, 2008 by

Symantec plugs Backup Exec holes

Security and data storage powerhouse Symantec has issued hotfixes for a slew of denial-of-service vulnerabilities affecting its Symantec Backup Exec for Windows Servers (BEWS) product.

November 28, 2007 by

Mozilla fixes its end of URL protocol handling saga

Exactly a week after admitting that Firefox was just as guilty as Internet Explorer when it comes to passing dangerous data to third party applications, the open-source group shipped Firefox with workarounds and patches for two related vulnerabilities.

July 30, 2007 by

Litchfield: ID database ethical, not technical problem

David Litchfield, who has in the past dramatically exposed various vulnerabilities in Oracle, has told ZDNet UK at the Black Hat security conference in Amsterdam that the UK ID data base is an ethical, not technical problem."The problems aren't technical, but ethical -- in terms of privacy.

March 30, 2007 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories