Vulnerabilities Vulnerabilities

Continuous news on hardware and software vulnerabilities from proof of concept to zero day, the dangerous to the novel. Follow the patching topic to narrow your news to emerging fixes.

Cisco reveals five new vulnerabilities

Cisco reveals five new vulnerabilities

Cisco Systems revealed five new vulnerabilities in one product line on Thursday.
Frank Washkuch Apr 7 2006 8:15PM Security
Best Vulnerability Assessment

Best Vulnerability Assessment

Overall Category Winner and Winner for Best Patch Management: Shavlik HFNetChkPro 5.1, Shavlik Technologies, LLC
Staff Writers Mar 13 2006 7:09PM Security
Matt Watchinski, Vulnerability researcher, Sourcefire

Matt Watchinski, Vulnerability researcher, Sourcefire

I’ve been penetration testing since I was about 15 years-old. I got interested in these things in the days of bulletin boards and the 1,200 baud modem when you had to figure out things for yourself or talk to others on the boards.
Staff Writers Mar 8 2006 4:20PM Security
Vulnerabilities up by over a third

Vulnerabilities up by over a third

Hackers are developing malware faster than ever, according to new research.
René Millman Mar 7 2006 3:36PM Security
The Common Vulnerability Scoring System: Get your threat priorities right

The Common Vulnerability Scoring System: Get your threat priorities right

Over the years, I’ve seen and used a diverse range of methods to evaluate and explain the risks associated with a particular security threat or vulnerability. Depending on the audience and the nature of the environment being evaluated, there has always been – and always will be – a frequent need to reclassify the severity of a finding. This is particularly relevant when making use of findings derived from automated security tools.
Gunter Ollmann Mar 6 2006 7:04PM Security
Google takes care of minor Gmail vulnerability

Google takes care of minor Gmail vulnerability

Google has patched a minor flaw that allowed JavaScript code to run when viewing a Gmail message, the search engine giant said today.
Dan Kaplan Mar 3 2006 9:58PM Security
Fresh MS vulnerabilities targeted

Fresh MS vulnerabilities targeted

Hackers are now threatening the seven vulnerabilities pointed out by Microsoft last Tuesday.
Frank Washkuch Feb 21 2006 8:38PM Security
From RSA 2006: 'Tis the year to cut down vulnerabilities

From RSA 2006: 'Tis the year to cut down vulnerabilities

Qualys has set a worthy goal for security companies to chase throughout 2006: cutting the half-lives of vulnerabilities by one-fifth.
Frank Washkuch Feb 16 2006 11:39PM Security
Review: Auditor Enterprise

Review: Auditor Enterprise

NetClarity’s Auditor is a fine example of a fully featured appliance that offers not just vulnerability assessment, but also ties results to compliance and ongoing information systems audit programs. Beginning from the superb documentation and ending with the high value for the money, this product shines.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: AZScan

Review: AZScan

AZScan has a way to go to become a world-class vulnerability assessment tool – the product is not intuitive. First, one needs to know quite a bit about the product being audited. Second, there is no online help or tool tips. Third, the menu choices don’t always behave as expected. Set-up seems easy at first, but details often don’t work.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: BindView Control Compliance Suite

Review: BindView Control Compliance Suite

The BindView Compliance Control Suite includes bv-Control for Windows, bv-Control for Internet Security and Compliance Center. This is a very complex suite of products and is part of a complete compliance and assessment toolkit that offers virtually every view necessary of the security compliance status of an enterprise. This very strength makes configuration and use of the product difficult at first.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: Core Impact

Review: Core Impact

Core Impact is different in that while it performs vulnerability assessment, it is primarily a penetration testing tool. It behaves like a hacker, performing vulnerability and port scans then attempting to penetrate the target using the vulnerabilities it finds. There are real benefits to this approach.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: GFI LANGuard Network Security Scanner

Review: GFI LANGuard Network Security Scanner

This is a straightforward vulnerability scanner that also manages patch deployment. It can push patches and service packs out to target computers by means of a patch agent installed on the target. We found it generally competent and straightforward to install on our Windows 2000 notebook.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: Nessus/NeWT

Review: Nessus/NeWT

Nessus has been a mainstay of vulnerability scanning since the Nessus Project was started by Renaud Deraison in 1998. The Nessus website claims that over 75,000 organizations worldwide use the program.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: NeXpose

Review: NeXpose

As an appliance, NeXpose fits into our category of fully featured products, but it is also available as software only. Uniquely, Rapid 7 also offers a managed service for organizations with limited resources.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: SAINT Scanner

Review: SAINT Scanner

Saint is a venerable product with its roots in the earliest days of automated vulnerability assessment. It has been dressed up in a new suit of clothes since becoming a commercial product, but retains its strong Unix roots.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Vulnerability assessment (2006)

Vulnerability assessment (2006)

Vulnerability assessment and penetration testing should be critical parts of all organizations’ security operations. Peter Stephenson puts some top assessment products through their paces
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Sophos report fingers top spam relaying nations

Sophos report fingers top spam relaying nations

The US continues to be the leading nation when it comes to relaying spam around the world, according to a security firm.
Staff Writers Jan 25 2006 10:15AM Security
Microsoft: New WMF vulnerabilities not exploitable

Microsoft: New WMF vulnerabilities not exploitable

Microsoft has downplayed additional memory corruption vulnerabilities in its Windows metafile image processing.
Frank Washkuch Jan 11 2006 8:29PM Security
Microsoft ‘fuming’ after Dasher-B exploits old Windows flaw

Microsoft ‘fuming’ after Dasher-B exploits old Windows flaw

Microsoft has been “left fuming” after security experts warned of new malware that successfully exploits a Windows flaw that the Redmond firm first identified over two months ago, a security expert claimed.
William Eazel Dec 19 2005 9:06AM Security

Log In

  |  Forgot your password?