Quantcast

Latest Vulnerability Stories

2014-10-30 23:05:57

Collaboration Provides Comprehensive View of Enterprise Network to Reduce Operational Risk Somerset, NJ & Portland, OR (PRWEB) October 30, 2014 Lumeta Corporation, the leader in network situational awareness, and Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the availability of a connector which integrates the Tripwire® IP360™ vulnerability management solution and the Lumeta® IPsonar® network...

2014-10-29 23:08:20

Security-as-a-Service provider offers an online-based assessment and ranking tool to help SMBs assess their cyber security protection Wilmington, Del. (PRWEB) October 29, 2014 My Digital Shield, a leading provider of Security-as-a-Service (SECaaS) for small businesses, today announced the launch of “Shield Test,” an online-based, complimentary security assessment tool that helps small businesses measure their vulnerability to cyber threats. In a quick 30-second scan, Shield Test...

2014-10-29 23:04:30

Tripwire Enterprise and IP360 integration delivers integrated, automated view of cybersecurity risk Portland, Oregon (PRWEB) October 29, 2014 Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, today announced new integration between Tripwire® Enterprise and Tripwire IP360 TM that delivers Adaptive Threat Protection. The integration and automation make it possible for users to respond faster and with precision to cybersecurity threats and...

2014-10-29 23:03:35

Continuing to advance software security capabilities is critical as consumers and businesses conduct more high-value business via mobile devices and cloud-based services. Natick, MA (PRWEB) October 29, 2014 Security has become a focal point of concern for organizations developing software used in embedded systems or enterprise applications, according to new data from VDC Research (click here for more info). Greater reliance on software for embedded device functionality and for managing...

2014-10-28 12:37:13

New methods make it possible to circumvent protection mechanisms of Microsoft EMET 5.0 VIENNA, Austria, October 28, 2014 /PRNewswire/ -- The EMET (Enhanced Mitigation Experience Toolkit) tool developed by Microsoft (NASDAQ: MSFT) makes it possible for administrators and end users to retroactively equip applications with additional protection mechanisms. This enhanced protection is intended to prevent various attack techniques that are currently used by cyber attackers....

2014-10-21 12:37:09

ARLINGTON, Va., Oct. 21, 2014 /PRNewswire/ -- Lunarline and Netsparker today announced a strategic partnership to integrate Netsparker's industry-leading web application security scanner with Lunarline's Sniper and Vulnerability Scan Converter (VSC) solutions. This will allow users to better manage and remediate web application vulnerabilities identified by the Netsparker Web Application Security Scanner. http://photos.prnewswire.com/prnvar/20110622/PH24580LOGO "Web scanning is a...

2014-10-17 23:08:16

The recent Shellshock vulnerability now makes it evident that relying only on typical “dictionary based” WAFs is both dangerous and ineffective when it comes to websites security. Fireblade proposes a behavioral based approach as a more capable option. (PRWEB) October 17, 2014 As was first published on Fireblade's blog: After the announcement of the recent Shellshock (CVE-2014-6271 and CVE-2014-7169) vulnerability, it becomes apparent again how fragile and dangerous a typical...

2014-10-14 08:38:17

RAMAT-GAN, Israel, October 14, 2014 /PRNewswire/ -- Friendly Technologies and Check Point Software Technologies ran a joint assessment of Friendly Technologies' Automatic Configuration Server (ACS) software, in order to evaluate and validate that the product, deployed by the company's global Tier-1 customers, is secure. Check Point is a worldwide leader in Internet security. Through a recent study of TR-069 ACS implementations, Check Point's Malware and Vulnerability...

Microsoft Unveils Windows 8
2014-10-14 08:18:23

Chuck Bednar for redOrbit.com - Your Universe Online Russian hackers have been exploiting a previously undetected flaw in the Microsoft Windows operating system to launch ‘zero-day’ attacks on NATO, the Ukrainian government, the European Union and academic targets in the US as part of an espionage campaign likely backed by the government, various media outlets are reporting. The activity, which was discovered by cybersecurity researchers at iSight Partners and colleagues from...

2014-10-09 23:01:46

Session takes place Friday, October 17, 2014, 2:00 p.m. EST Portland, Oregon (PRWEB) October 09, 2014 Tripwire, Inc., a leading provider of advanced threat, security and compliance solutions, today announced that Lane Thames and Andrew Swoboda, security researchers for the company’s Vulnerability and Exposure Research Team (VERT), will be presenting at Hacker Halted 2014. The conference will take place October 16-17, 2014, at the Georgia World Congress Center in Atlanta, Georgia. Over...


Word of the Day
maffling
  • To stammer.
  • Present participle of maffle, to stammer.
  • A simpleton.
The word 'maffle' may come from a Dutch word meaning 'to move the jaws' or a French word meaning 'having large cheeks'.