Identity Finder Professional Edition is ideal for individuals and power users looking to protect their sensitive information on personal...
Showing results 1 to 20 of 29
UPDATED. I ran the numbers and vulnerabilities in browsers are up this year, as is their severity. We know more about this for Internet Explorer because Microsoft provides the most data.
Yet another failure to tell users directly about security vulnerabilities highlights the need not just for mandatory data breach notification laws, but mandatory notification of security and privacy risks.
MS13-061, released on Tuesday to address 3 vulnerabilities in an Oracle component in Exchange Server, causes data to be inaccessible in Exchange Server 2013. Microsoft has pulled the update and released guidance for how to work around the problems it causes.
Most companies don't have a BYOD policy, and of those that do, a quarter give C-suite executives special treatment, according to a survey by data backup vendor Acronis.
Reporting of vulnerabilities and exploits essential to establish procedure consistency in security products as well as protect customers against cyberattacks, but companies that do so must practice discretion in data they divulge.
VE-Disk is a small, compact program for creating encrypted virtual disks. It helps you keep your sensitive and vulnerable data and...
The Australian Government has a list of software holes that are so sensitive they're kept hidden from the public. These weaknesses are being used by criminals to steal our money and our data. These vulnerabilities are also the bait with which cyber-criminals are caught.
Compared with Web servers, systems used to run mobile apps require more compute power and give users more access to previously off-limits data, notes security expert, who warns these developments open up more security vulnerabilities.
According to data from Microsoft's malware protection center, there has been an "unprecedented wave" of exploits against vulnerabilities in Oracle Sun's Java software in 2010.
Google has shipped a high-priority Chrome browser patch with fixes for three security vulnerabilities that expose users to cross-site scripting and data theft attacks.Google Chrome's beta and stable channels have been updated to version 1.
The first security patch for Google's new Chrome browser is out, fixing at least two "critical" vulnerabilities that put Windows users at risk of code execution attacks.[ SEE: Google Chrome vulnerable to carpet-bombing flaw ]The patch, which is rolled out automatically via Chrome's auto-update feature, also addresses two additional security vulnerabilities -- the carpet-bombing issue and a denial-of-service flaw that could lead to browser crashes and data loss.
Code inspector Ounce Labs has identified two vulnerabilities in the open source Spring framework that exposes their enterprise applications to would-be hackers and hijackers.The two issues, ModelView Injection and Data Submission to Non-Editable Fields, affect only the MVC module of the Spring framework, which is used to build enterprise web applications.
Cisco patched multiple vulnerabilities on Wednesday with the most important fixes covering data-link switching, IPv6 and VPN flaws.Among the highest rated patches (all rated 7 or above on a 10 scale):Cisco patched multiple vulnerabilities in the Data-link Switching (DLSw) feature in its IOS.
Microsoft plugged more than a few vulnerabilities in Excel last week, but the trade off may be calculation errors.Microsoft's Bill Sisk said in a post late Friday following the software giant's latest patch batch:I wanted to let you know that we have updated bulletin MS08-014 to provide additional information on a newly identified issue that causes Microsoft Excel 2003 calculations to return an incorrect result when a Real Time Data source is used.
The searchlight seems to be shining on open source software more than ever right now asking for visibility into form and function to ensure vulnerabilities and instabilities are avoided. HP’s recent FOSSology announcement claimed to launch an initiative to, “Facilitate the study of free and open source software by providing free data analysis tools.
Security and data storage powerhouse Symantec has issued hotfixes for a slew of denial-of-service vulnerabilities affecting its Symantec Backup Exec for Windows Servers (BEWS) product.
Exactly a week after admitting that Firefox was just as guilty as Internet Explorer when it comes to passing dangerous data to third party applications, the open-source group shipped Firefox 188.8.131.52 with workarounds and patches for two related vulnerabilities.
David Litchfield, who has in the past dramatically exposed various vulnerabilities in Oracle, has told ZDNet UK at the Black Hat security conference in Amsterdam that the UK ID data base is an ethical, not technical problem."The problems aren't technical, but ethical -- in terms of privacy.
Two recently disclosed vulnerabilities that affect Internet Explorer 7 and Windows Vista could let hackers nab user data.
Three versions of the smart phone carry vulnerabilities that could allow access to data even when the device is locked.
The data is clear, and Apple has a lot more vulnerabilities of every kind ranging from moderately critical to extremely critical.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)