Showing results 1 to 20 of 42

September 12, 2013 By GFI Software

GFI LanGuard

GFI LanGuard is an award-winning vulnerability and patch management solution trusted by tens of thousands of businesses to protect...

September 16, 2013 by

Who's on Tor? Dissent, bots or porn?

Researchers who found a vulnerability in the protocols used in the Tor anonymous Internet service used it to survey the traffic on the network. They found that "…while the content of Tor hidden services is rather varied, the most popular hidden services are related to botnets."

March 6, 2013 By Boom Security


BoomScan 2013 for Small Business and Enterprise Test Your Network For Vulnerabilities: * Identify Vulnerabilities and Weaknesses *...

November 10, 2011 By Rapid7


A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security...

January 21, 2010

Data Privacy: What Part of Your Network Is Vulnerable, and What Can You Do About It?

Doc thinks networked environments are both a boon and a burden to organizations. They greatly improve productivity and reduce cost by allowing customers, vendors, partners, employees, and other stakeholders to share and access information in real time. But increased access to sensitive information makes networks vulnerable to malicious activity and misuse. There have been numerous high-profile data security breaches and losses, prompting a rise in government regulations surrounding data privacy.

September 3, 2009 by

O2 to remotely fix router vulnerability

O2 has come up with a fix for a flaw that affects some of its home broadband routers.The cross-site request forgery (CSRF) vulnerability could allow someone to gain unauthorised access to a user's private network.

August 25, 2008 by

Facebook refuses to fix obvious security flaw

[ UPDATE:  Facebook has reversed itself and fixed this vulnerability ]  The Register's Dan Goodin has the scoop on an obvious security vulnerability that's being ignored by the powers at Facebook.The issue, as demonstrated by this proof-of-concept, shows how a social network application can be rigged to hijack a Facebook user's session identification cookies, deliver pop-up messages or change the color of Facebook pages.

August 7, 2008 by

CNET's Clientside developer blog serving Adobe Flash exploits

Yesterday, Websense Labs issued an alert regarding a compromised CNET blog, namely the Clientside developer blog which has been embedded with a malicious javascript code attempting to exploit the visitors through a well known vulnerability in Adobe Flash's player. Websense's alert :"Websense Security Labs ThreatSeeker Network has discovered that a CNET Networks site has been compromised.

March 18, 2008 by

How to detect network vulnerabilities?

Computer scientists at George Mason University (GMU) have developed a new software to identify complex cyber network attacks. This software is named CAULDRON (short for 'Combinatorial Analysis Utilizing Logical Dependencies Residing on Networks'). The developers claim that CAULDRON 'can reduce the impact of cyber attacks by identifying the possible vulnerability paths through an organization's networks.' Their research was funded by grants from the defense, homeland security and intelligence communities and the Federal Aviation Administration (FAA). The FAA has already installed CAULDRON in its Cyber Security Incident Response Center to prioritize security problems. According to the developers, this software can be used 'in almost any industry or organization with a network and resources they want to keep protected.' But read more...

July 13, 2005 by

Water utilities to review network security

Government utilities Brisbane and Yarra Valley Water will assess the security of their computer networks as part of the Computer Network Vulnerability Assessment (CNVA) program.The AU$8 million CNVA is a key part of government efforts to secure Australia's critical infrastructure against threats such as terrorist attacks.

June 21, 2005 by

Novell in trouble over GroupWise flaw

Three months after being informed of a serious security vulnerability in its GroupWise collaboration suite, Novell is still struggling to release an effective fix for the problem, according to a security manager.The problem allows an attacker to obtain login details remotely, according to Jeff Truedson, network security manager for lighting manufacturer Hubbell.


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular