vulnerable

Big Security for Big Data

Big Security for Big Data

Big security for big data We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data. It is because information is so pervasive that businesses want to capture this data and analyze it for intelligence.
Oct 16 2013 11:45AM
Vulnerable ad servers exploited with OpenX flaw

Vulnerable ad servers exploited with OpenX flaw

Exploits known vulnerability in old version.
May 10 2010 12:46PM
Opera posts security update for Apple and Windows

Opera posts security update for Apple and Windows

Patches vulnerabilities.
May 3 2010 6:29AM
Over 50% of apps vulnerable to security breaches

Over 50% of apps vulnerable to security breaches

As Microsoft divulges IE flaw work-around.
Mar 3 2010 2:52PM
Cyberwar test shows US vulnerable to attack

Cyberwar test shows US vulnerable to attack

Test highlights vulnerability of national networks.
Feb 18 2010 4:19PM
Clientless SSL VPN products vulnerable

Clientless SSL VPN products vulnerable

Systems bypass fundamental security mechanisms.
Dec 7 2009 10:58AM
Disability site vulnerable to XSS attack

Disability site vulnerable to XSS attack

Betsie under threat.
Nov 10 2009 11:09AM
Hacked Windows 7 appears on file-share sites

Hacked Windows 7 appears on file-share sites

Lenovo source code key goes walkabout.
Aug 1 2009 7:30AM
IE flaw worse than originally thought

IE flaw worse than originally thought

Microsoft has confirmed that it is not just Internet Explorer (IE) 7 that is vulnerable to a new zero day attack, but older versions of the browser too.
Dec 15 2008 7:06AM
Quarter of web apps critically vulnerable

Quarter of web apps critically vulnerable

Companies still underestimating the level of risk, says new report.
Dec 9 2008 10:16AM
Vista kernel is vulnerable

Vista kernel is vulnerable

A flaw has been discovered in Microsoft's flagship Windows Vista operating system.
Nov 25 2008 9:55AM
Yahoo's HotJobs site vulnerable to cross-site scripting attack

Yahoo's HotJobs site vulnerable to cross-site scripting attack

Internet research firm Netcraft said it has detected a cross-site scripting vulnerability on Yahoo that could be used to hijack authentication cookies.
Oct 28 2008 2:30PM
Google to notify webmasters of vulnerable software

Google to notify webmasters of vulnerable software

Running an older (and possibly exploitable) version of WordPress or another publishing program? Google will let you know.
Oct 20 2008 9:57AM
Mobile phones are vulnerable to botnets

Mobile phones are vulnerable to botnets

Security researchers at Georgia Tech have determined that mobile phones are vulnerable to hacking attacks.
Oct 16 2008 6:48AM
iPhone vulnerable to hack attacks

iPhone vulnerable to hack attacks

Insecurity researcher Aviv Raff has warned that iPhone's Mail and Safari applications are prone to a URL spoofing vulnerability that could direct unsuspecting surfers to malicious phishing sites.
Jul 24 2008 4:20PM
Motorola RAZR vulnerable to JPEG attack

Motorola RAZR vulnerable to JPEG attack

Hackers could run malicious code on the RAZR device by sending a corrupt image by MMS, according to an advisory from TippingPoint
May 30 2008 9:58AM
Undersea cables 'highly vulnerable'

Undersea cables 'highly vulnerable'

The recent failure of undersea cables serving the Middle East and North Africa highlights the vulnerability of submarine communications to terrorist and other deliberate attacks..
Feb 12 2008 7:43AM
Poor Citrix set-ups leave firms vulnerable

Poor Citrix set-ups leave firms vulnerable

Many companies "incorrectly" deploying Citrix technology are leaving internal systems and sensitive data open to attack, a security testing firm warned.

Jan 10 2008 11:14AM
Firefox authentication box said to be vulnerable to spoofing for phishing attacks

Firefox authentication box said to be vulnerable to spoofing for phishing attacks

The information in an authentication dialog box from Mozilla's Firefox browser can be spoofed, allowing an attacker to conduct phishing schemes, according to Israeli researcher Aviv Raff.
Jan 8 2008 4:07PM
Wireless keyboards vulnerable to hacking via radio receivers: Dreamlab

Wireless keyboards vulnerable to hacking via radio receivers: Dreamlab

Cybercriminals can log the keystrokes of end-users by cracking the encryption of non-Bluetooth wireless keyboards from over 30 feet away, according to researchers at Dreamlab Technologies.
Dec 10 2007 9:57AM

Log In

Username / Email:
Password:
  |  Forgot your password?