Latest News
DTA trials AI to assist Digital Marketplace application reviews
International coalition calls out three Chinese companies over hacking campaign
"Widespread data theft" hits Salesforce customers via third party
Woolworths cuts Big W loose from shared technology stack
ESET spots "PromptLock" AI-powered ransomware
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
vulnerability
vulnerability
Google takes care of minor Gmail vulnerability
Google has patched a minor flaw that allowed JavaScript code to run when viewing a Gmail message, the search engine giant said today.
Dan Kaplan
Mar 3 2006 9:58PM
Security
Review: Auditor Enterprise
NetClarity’s Auditor is a fine example of a fully featured appliance that offers not just vulnerability assessment, but also ties results to compliance and ongoing information systems audit programs. Beginning from the superb documentation and ending with the high value for the money, this product shines.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: AZScan
AZScan has a way to go to become a world-class vulnerability assessment tool – the product is not intuitive. First, one needs to know quite a bit about the product being audited. Second, there is no online help or tool tips. Third, the menu choices don’t always behave as expected. Set-up seems easy at first, but details often don’t work.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: BindView Control Compliance Suite
The BindView Compliance Control Suite includes bv-Control for Windows, bv-Control for Internet Security and Compliance Center. This is a very complex suite of products and is part of a complete compliance and assessment toolkit that offers virtually every view necessary of the security compliance status of an enterprise. This very strength makes configuration and use of the product difficult at first.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: Core Impact
Core Impact is different in that while it performs vulnerability assessment, it is primarily a penetration testing tool. It behaves like a hacker, performing vulnerability and port scans then attempting to penetrate the target using the vulnerabilities it finds. There are real benefits to this approach.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: GFI LANGuard Network Security Scanner
This is a straightforward vulnerability scanner that also manages patch deployment. It can push patches and service packs out to target computers by means of a patch agent installed on the target. We found it generally competent and straightforward to install on our Windows 2000 notebook.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: Nessus/NeWT
Nessus has been a mainstay of vulnerability scanning since the Nessus Project was started by Renaud Deraison in 1998. The Nessus website claims that over 75,000 organizations worldwide use the program.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: NeXpose
As an appliance, NeXpose fits into our category of fully featured products, but it is also available as software only. Uniquely, Rapid 7 also offers a managed service for organizations with limited resources.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Review: SAINT Scanner
Saint is a venerable product with its roots in the earliest days of automated vulnerability assessment. It has been dressed up in a new suit of clothes since becoming a commercial product, but retains its strong Unix roots.
Peter Stephenson
,CeRNS,
Feb 1 2006 12:00AM
Security
Sophos report fingers top spam relaying nations
The US continues to be the leading nation when it comes to relaying spam around the world, according to a security firm.
Staff Writers
Jan 25 2006 10:15AM
Security
Vulnerability is our business
It might seem like a cosy, family-run business, but as
David Quainton
discovers, Next Generation Software has earned a global reputation
David Quainton
Oct 21 2005 3:27PM
Security
Developing a patch and vulnerability management strategy
In the first two quarters of 2005 more than 3,780 software vulnerabilities were reported, leaving a wide range of system components and software open to exploits. With the popular operating systems often the key target of worm and virus writers, the majority of businesses are left open to attacks.
Alan Bentley
Oct 20 2005 11:03AM
Security
Australia drops off 'Dirty Dozen' spammers list
Australia did not rank in the top 12 spam relaying countries in the past six months, according to the latest report from security firm Sophos.
Vivienne Fisher
Oct 13 2005 4:13PM
Security
Financial spam tops list in August
Financial spam topped the list of most prevalent spam during August, according to a report from Trend Micro.
Vivienne Fisher
Sep 14 2005 9:41AM
Security
How not to get hacked: Microsoft
Microsoft pushed security to the front of its Tech.Ed agenda on the Gold Coast this week, holding a developer and technical support session aimed explaining the easiest routes to hack attack on any IT network.
Fleur Doidge
Sep 1 2005 3:18PM
Security
Windows vulnerability sparks viral warfare
The Zotob worm and its Windows hitting counterpart, Ircbot, are waged in viral warfare. Ircbots and a similar virus group known as Bozori are actively deleting Zotob viruses, the first to
attack a newly announced Windows vulnerability
.
David Quainton
Aug 18 2005 10:38AM
Security
NIST unveils new vulnerability database
The National Institute of Standards and Technology (NIST) has launched a new vulnerability database that integrates all publicly available federal vulnerability resources and provides links to industry resources.
Marcia Savage
Aug 15 2005 5:55PM
Security
Netsky remains on the radar
Netsky-P took out the number one spot for viruses causing problems for businesses during July, according to a security firm.
Vivienne Fisher
Aug 3 2005 10:03AM
Telco/ISP
Viruses on the increase: report
The time it takes for a PC to get infected by an internet worm is dropping, according to a security firm.
Staff Writers
Jul 5 2005 11:02AM
Security
Alluring images hoodwink users
People are being lured into opening worm-carrying emails by subject lines referring to alluring pictures.
Vivienne Fisher
May 30 2005 4:19PM
Security
Previous
Next
Most popular tech stories
CBA keeps pushing limits of its Workday environment
Chemist Warehouse runs AI on HR shared inbox
Coles eyes AI to keep shelves stocked in next viral recipe trend
CBA to keep roles it had reviewed after installing AI bot
Serco connects dispersed workforce through ServiceNow-backed platform
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Rail operator Aurizon uses IoT to help save $380m
Govt launches consumer tech label program for smart devices
Photos: IoT Impact 2023 brings together data-enabled productivity, sustainability and trust opportunities
Honeywell touts role in Sydney Opera House achieving 6 Star Green Star rating
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?