Vulnerability

Showing of 21 - 40 from 63 results
Vulnerability - Total results - 63
Mobile apps are the new battlefield for cyber attacks: Report
News & Analysis

Mobile apps are the new battlefield for cyber attacks: Report

Approximately 75 percent of the mobile applications scanned exhibited at least one critical or high-severity security vulnerability, compared to 35 percent of non-mobile applications.

Google releases monthly Android security update for Nexus devices
News & Analysis

Google releases monthly Android security update for Nexus devices

Google has released a security update to Nexus devices through an over-the-air (OTA) update as part of its Android Security Bulletin Monthly Release process.

CoreOS introduces Clair - a tool for monitoring container security
Business

CoreOS introduces Clair - a tool for monitoring container security

Clair is an API-driven analysis engine that inspects containers layer-by-layer for known security flaws.

Exposed! Researchers reveal crypto key vulnerability in Amazon cloud
Business

Exposed! Researchers reveal crypto key vulnerability in Amazon cloud

Researchers have developed a technique that allows an attacker use an account on Amazon Elastic Compute Cloud (EC2) to steal cryptographic keys of other AWS users.

Stagefright -- the worst Android vulnerability ever dubbed 'heartbleed for mobile'
Business

Stagefright -- the worst Android vulnerability ever dubbed 'heartbleed for mobile'

Nearly 95 percent, or 950 million, Android devices are affected by this "scary" vulnerability, according to researchers.

Apple Mac sleep mode vulnerability is critical, warns Symantec
Business

Apple Mac sleep mode vulnerability is critical, warns Symantec

This vulnerability is rated as critical since it can provide an attacker with persistent root access to a computer that may survive any disk wipe or operating system reinstallation.

Warning bell for enterprises: Nearly all SAP systems remain vulnerable to attacks
Business

Warning bell for enterprises: Nearly all SAP systems remain vulnerable to attacks

One of the most common cyberattack vectors on SAP systems is the use of pivots between different systems. The attack begins with a pivot from a system with lower security to a critical system in order to execute remote function modules in the destination system.

Researchers claim new Windows security weakness 'Redirect to SMB'
Business

Researchers claim new Windows security weakness 'Redirect to SMB'

An old weakness in Microsoft's Windows operating system could theoretically allow hackers to steal login credentials from hundreds of millions of PCs.

The Poodle continues to affect Microsoft cloud: Greyhound Research
Business

The Poodle continues to affect Microsoft cloud: Greyhound Research

According to Greyhound Research, Microsoft Office 365 continues to rate weak on SSL3.0 Security Vulnerability.

40% mobile apps not safe for handling data: Study
Biztech

40% mobile apps not safe for handling data: Study

While the high level vulnerabilities were divided equally (50 percent) between the two operating systems, among the critical ones Apple iOS was found to be much more vulnerable at 67 percent in comparison to Android which stood at 33 percent.

Shellshock: What do you actually need to do to stay secure?
Biztech

Shellshock: What do you actually need to do to stay secure?

Since Shellshock targets UNIX-based machines, organisations should harden their servers. This can be done by implementing a 'least privilege' strategy and preventing unlimited root shell accesses.

Shellshock: Every version of Linux stretching back over two decades is vulnerable
Biztech

Shellshock: Every version of Linux stretching back over two decades is vulnerable

All versions of PAN-OS and Panorama include the vulnerable version of Bash, but we've determined the issue is only exploitable by authenticated users, says the security company.

Shellshock: Know everything about this 'extremely serious' bug
Biztech

Shellshock: Know everything about this 'extremely serious' bug

Known as the 'Bash Bug' or 'Shellshock', the GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271) could allow an attacker to gain control over a targeted computer if exploited successfully.

IBM Unveils Software To Help Cos Identify And Predict Security Risk
Biztech

IBM Unveils Software To Help Cos Identify And Predict Security Risk

As cyber attacks increase in volume and severity, QRadar Vulnerability Manager helps identify, sort, contextualise and prioritise network vulnerabilities.

UN warns on mobile cybersecurity bugs in bid to prevent attacks
News & Analysis

UN warns on mobile cybersecurity bugs in bid to prevent attacks

A United Nations group that advises nations on cybersecurity plans to send out an alert about significant vulnerabilities...

HP Delivers Actionable Security Intelligence To Reduce Business Risk
Biztech

HP Delivers Actionable Security Intelligence To Reduce Business Risk

New research reveals vulnerabilities up nearly 20 percent.

Vulnerability Volume Down, Not Risk: HP
Biztech

Vulnerability Volume Down, Not Risk: HP

HP Research identifies new era of security risk, shifting vulnerability landscape.

Unique 'Fileless' Bot Attacks Visitors To News Sites
Biztech

Unique 'Fileless' Bot Attacks Visitors To News Sites

Experts from Kaspersky Lab uncovered the hidden attack, which exploited a vulnerability in the teasers used by a number of popular Russian news sources.

Security Breach Hits Linux Foundation Sites, Down For Maintenance
Biztech

Security Breach Hits Linux Foundation Sites, Down For Maintenance

Kernel.org was the first site to be hacked and similar vulnerabilities are likely to exist on some of the sister sites.

Security breach hits Linux Foundation sites, down for maintenance
News & Analysis

Security breach hits Linux Foundation sites, down for maintenance

The latest victims of a hack attack are sites belonging to the Linux Foundation.