GFI LanGuard is an award-winning vulnerability and patch management solution trusted by tens of thousands of businesses to protect...
Showing results 1 to 20 of 22
Researchers who found a vulnerability in the protocols used in the Tor anonymous Internet service used it to survey the traffic on the network. They found that "…while the content of Tor hidden services is rather varied, the most popular hidden services are related to botnets."
There's a remote, pre-authentication, network-accessible code execution vulnerability in Microsoft's implementation of the RDP protocol.
O2 has come up with a fix for a flaw that affects some of its home broadband routers.The cross-site request forgery (CSRF) vulnerability could allow someone to gain unauthorised access to a user's private network.
Microsoft's Security Response Center and McAfee are warning on increased network scanning activity during the last couple of days courtesy of the very latest W32/Conficker.worm exploiting the already patched MS08-067 vulnerability.
[ UPDATE: Facebook has reversed itself and fixed this vulnerability ] The Register's Dan Goodin has the scoop on an obvious security vulnerability that's being ignored by the powers at Facebook.The issue, as demonstrated by this proof-of-concept, shows how a social network application can be rigged to hijack a Facebook user's session identification cookies, deliver pop-up messages or change the color of Facebook pages.
BoomScan 2013 for Small Business and Enterprise Test Your Network For Vulnerabilities: * Identify Vulnerabilities and Weaknesses *...
Computer scientists at George Mason University (GMU) have developed a new software to identify complex cyber network attacks. This software is named CAULDRON (short for 'Combinatorial Analysis Utilizing Logical Dependencies Residing on Networks'). The developers claim that CAULDRON 'can reduce the impact of cyber attacks by identifying the possible vulnerability paths through an organization's networks.' Their research was funded by grants from the defense, homeland security and intelligence communities and the Federal Aviation Administration (FAA). The FAA has already installed CAULDRON in its Cyber Security Incident Response Center to prioritize security problems. According to the developers, this software can be used 'in almost any industry or organization with a network and resources they want to keep protected.' But read more...
A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security...
Government utilities Brisbane and Yarra Valley Water will assess the security of their computer networks as part of the Computer Network Vulnerability Assessment (CNVA) program.The AU$8 million CNVA is a key part of government efforts to secure Australia's critical infrastructure against threats such as terrorist attacks.
Three months after being informed of a serious security vulnerability in its GroupWise collaboration suite, Novell is still struggling to release an effective fix for the problem, according to a security manager.The problem allows an attacker to obtain login details remotely, according to Jeff Truedson, network security manager for lighting manufacturer Hubbell.
Security vulnerability lets intruder enter network and nab info on millions of credit card holders.
The government is seeking help from the IT community to help identify and plug vulnerabilities in Australia's critical infrastructure to protect citizens from cyber terrorism.Attorney-General Philip Ruddock announced the government was going to spend more than AU$8 million on the Computer Network Vulnerability Assessment (CNVA) program, which will identify and plug any security vulnerabilities in the "computer networks and systems that support the provision of essential services to Australians".
A virus that exploits the recently discovered JPEG vulnerability has been discovered spreading over America Online's instant-messaging program. Experts at the SysAdmin Audit Network Security, or SANS, Institute said the virus is still in its infancy, with the institute having received only two reports of infection so far.
Two developers of Internet tools say they have discovered a major network vulnerability--but security researchers don't believe the flaw is serious.
With the recent conspicuous network attacks exposing new vulnerability, the firewall market is poised for transformation. Traditional firewalls provide security based on network parameters such as the origin, the server destination, or the application destination of the network transmission.
Microsoft's Media Player 9 has a vulnerability that could allow an attacker to play or modify media files on a target system. The big danger here is that many companies and even government agencies have begun to take advantage of fast network connections
P2P file sharing network users were urged to install a patch to fix a 'serious' security vulnerability that has been discovered by Random Nut
A serious vulnerability, which may allow attackers to obtain confidential information, has been found in PeopleSoft’s Application Messaging Gateway servlet. Internet Security Systems (ISS), a network security company based in Atlanta, USA, discovered the security glitch, present in default installations, and released an advisory.
Before a hacker reveals the gaps in your network security, do it yourself. Using a network vulnerability scanner is like hiring a hacker, only the intelligence is artificial.
Network equipment maker Cisco Systems warned Thursday that a previous fix for a vulnerability in the secure shell (SSH) module used in many of its devices actually causes an instability that could make the operating system freeze. In an advisory, the networking giant said all routers and switches running the company's homegrown operating system, Cisco IOS, and the CatOS could be affected if a hacker scans the system for an SSH vulnerability found last fall. Both the Cisco PIX Firewall family and the Cisco 11000 Content Service Switch family are vulnerable. --Robert Lemos, Special to ZDNet News
Vendors may be touting new vulnerability assessment products that will work wonders for your network, but don't believe the hype. Wayne Rash says there's nothing revolutionary at large.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)