Showing results 1 to 20 of 22

GFI LanGuard

GFI LanGuard is an award-winning vulnerability and patch management solution trusted by tens of thousands of businesses to protect...

September 12, 2013 By GFI Software

Who's on Tor? Dissent, bots or porn?

Researchers who found a vulnerability in the protocols used in the Tor anonymous Internet service used it to survey the traffic on the network. They found that "…while the content of Tor hidden services is rather varied, the most popular hidden services are related to botnets."

September 16, 2013

O2 to remotely fix router vulnerability

O2 has come up with a fix for a flaw that affects some of its home broadband routers.The cross-site request forgery (CSRF) vulnerability could allow someone to gain unauthorised access to a user's private network.

September 3, 2009 by

Facebook refuses to fix obvious security flaw

[ UPDATE:  Facebook has reversed itself and fixed this vulnerability ]  The Register's Dan Goodin has the scoop on an obvious security vulnerability that's being ignored by the powers at Facebook.The issue, as demonstrated by this proof-of-concept, shows how a social network application can be rigged to hijack a Facebook user's session identification cookies, deliver pop-up messages or change the color of Facebook pages.

August 25, 2008 by


BoomScan 2013 for Small Business and Enterprise Test Your Network For Vulnerabilities: * Identify Vulnerabilities and Weaknesses *...

March 6, 2013 By Boom Security

CNET's Clientside developer blog serving Adobe Flash exploits

Yesterday, Websense Labs issued an alert regarding a compromised CNET blog, namely the Clientside developer blog which has been embedded with a malicious javascript code attempting to exploit the visitors through a well known vulnerability in Adobe Flash's player. Websense's alert :"Websense Security Labs ThreatSeeker Network has discovered that a CNET Networks site has been compromised.

August 7, 2008 by

How to detect network vulnerabilities?

Computer scientists at George Mason University (GMU) have developed a new software to identify complex cyber network attacks. This software is named CAULDRON (short for 'Combinatorial Analysis Utilizing Logical Dependencies Residing on Networks'). The developers claim that CAULDRON 'can reduce the impact of cyber attacks by identifying the possible vulnerability paths through an organization's networks.' Their research was funded by grants from the defense, homeland security and intelligence communities and the Federal Aviation Administration (FAA). The FAA has already installed CAULDRON in its Cyber Security Incident Response Center to prioritize security problems. According to the developers, this software can be used 'in almost any industry or organization with a network and resources they want to keep protected.' But read more...

March 18, 2008 by


A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security...

November 10, 2011 By Rapid7

Water utilities to review network security

Government utilities Brisbane and Yarra Valley Water will assess the security of their computer networks as part of the Computer Network Vulnerability Assessment (CNVA) program.The AU$8 million CNVA is a key part of government efforts to secure Australia's critical infrastructure against threats such as terrorist attacks.

July 13, 2005 by

Novell in trouble over GroupWise flaw

Three months after being informed of a serious security vulnerability in its GroupWise collaboration suite, Novell is still struggling to release an effective fix for the problem, according to a security manager.The problem allows an attacker to obtain login details remotely, according to Jeff Truedson, network security manager for lighting manufacturer Hubbell.

June 21, 2005 by

Government launches anti-cyberterrorism campaign

The government is seeking help from the IT community to help identify and plug vulnerabilities in Australia's critical infrastructure to protect citizens from cyber terrorism.Attorney-General Philip Ruddock announced the government was going to spend more than AU$8 million on the Computer Network Vulnerability Assessment (CNVA) program, which will identify and plug any security vulnerabilities in the "computer networks and systems that support the provision of essential services to Australians".

November 29, 2004 by

Image virus spreads via chat

A virus that exploits the recently discovered JPEG vulnerability has been discovered spreading over America Online's instant-messaging program. Experts at the SysAdmin Audit Network Security, or SANS, Institute said the virus is still in its infancy, with the institute having received only two reports of infection so far.

September 30, 2004 by

New Security Attacks Require New Security Technology

With the recent conspicuous network attacks exposing new vulnerability, the firewall market is poised for transformation. Traditional firewalls provide security based on network parameters such as the origin, the server destination, or the application destination of the network transmission.

October 13, 2003 by

PeopleSoft vulnerability threatens data

A serious vulnerability, which may allow attackers to obtain confidential information, has been found in PeopleSoft’s Application Messaging Gateway servlet. Internet Security Systems (ISS), a network security company based in Atlanta, USA, discovered the security glitch, present in default installations, and released an advisory.

January 22, 2003 by

Smart security: network scanners

Before a hacker reveals the gaps in your network security, do it yourself. Using a network vulnerability scanner is like hiring a hacker, only the intelligence is artificial.

October 23, 2002 by

Cisco's fix for flaw runs into problems

Network equipment maker Cisco Systems warned Thursday that a previous fix for a vulnerability in the secure shell (SSH) module used in many of its devices actually causes an instability that could make the operating system freeze. In an advisory, the networking giant said all routers and switches running the company's homegrown operating system, Cisco IOS, and the CatOS could be affected if a hacker scans the system for an SSH vulnerability found last fall. Both the Cisco PIX Firewall family and the Cisco 11000 Content Service Switch family are vulnerable. --Robert Lemos, Special to ZDNet News

June 28, 2002 by

New vulnerability products are old hat

Vendors may be touting new vulnerability assessment products that will work wonders for your network, but don't believe the hype. Wayne Rash says there's nothing revolutionary at large.

April 2, 2002 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories