Quantcast
Last updated on April 16, 2014 at 7:00 EDT

Latest Vulnerability Stories

2013-09-04 08:22:35

Vulnerability and exploit research company Exodus Intelligence and Icelandic information security think-tank Syndis have joined forces for a new zero-day service offering called LiveFire. AUSTIN, Texas, Sept. 4, 2013 /PRNewswire-iReach/ -- LiveFire is the world's first attack technology service to realistically replicate the threat facing todays leading organizations through a unique partnership between Exodus' Exploit Pack (EXP) service, and Syndis' goal oriented attack methodology. (Photo:...

2013-08-30 08:27:02

Quotium research shows the large majority of security managers feel their organization's applications are still vulnerable to hacker attacks, despite best efforts to employ wide range of solutions to prevent application threats LONDON, Aug. 30, 2013 /PRNewswire/ -- Application vulnerabilities are a major factor in the cyber-crime game. The objectives of Quotium's research published today was to better understand the solutions used to secure applications in leading corporates in...

2013-08-29 23:02:09

Security Leader to Provide Practical Advice on Implementing Security Control Framework Portland, OR (PRWEB) August 29, 2013 Tripwire, Inc., a global provider of risk-based security and compliance management solutions, today announced a new web seminar on the SANS 20 Critical Security Controls (20 CSC). The 20 CSC was developed by the National Security Agency (NSA) to provide guidance that would efficiently direct resources to combat the most common network vulnerabilities and reduce the...

2013-08-22 23:03:05

All Star Security launches a new website with sleek design and a new interface. The article covers the basics of All Star Security and some of their basic business practices. Austin, Texas (PRWEB) August 22, 2013 All Star Security is pleased to announce the official launch of their new web site allstarsecurity.com. The site formerly known as austinallstarsecurity.com is an Austin based security company offering professional services “specializing in the design and installation of...

2013-08-20 23:22:20

CompliancePoint, an information security consulting and services provider, announces the launch of its Mobile Vulnerability Scanning Service that provides organizations with improved security and management of mobile devices, including for those employees who bring their own mobile devices to work. Atlanta, Georgia (PRWEB) August 20, 2013 CompliancePoint, an information security consulting and services provider, announces the launch of its Mobile Vulnerability Scanning Service that...

2013-08-20 23:20:55

Leading home security system review site, SecuritySystemReviews.com, has released its list of the top Do-It-Yourself security system services available in the US market today. The site hopes that through the list it can provide support to consumers who are looking to employ security systems for their homes at a budget. Pittsburgh, PA (PRWEB) August 20, 2013 SecuritySystemReviews.com, the leading home security system review site, has recently announced its list of the Top 5 Do-It-Yourself...

Vigilante Posts Security Vulnerability On Zuckerberg's Timeline
2013-08-19 10:31:58

Peter Suciu for redOrbit.com – Your Universe Online Palestinian IT expert Khalil Shreateh demonstrated a Facebook vulnerability by posting a bug report directly on company founder Mark Zuckerberg’s Timeline. This type of thing should have been restricted as the two aren’t friends, and Shreateh claims he took this drastic measure to prove to Facebook that the bug he discovered was in fact legitimate. Initially Shreateh tried to report the vulnerability through the security feedback...

2013-08-16 23:21:31

Service meant to help businesses and organizations engage in strong digital security practices Houston, TX (PRWEB) August 16, 2013 McCann Investigations, a private investigations firm in the Houston area that focuses heavily on digital security and forensics, announced the availability of its network vulnerability assessments. A network vulnerability assessment is the first step to implementing a process to find and identify security risks in a digital network. Businesses or organizations...

2013-08-12 23:21:19

Reid Wightman will present on industrial controller design issues that compromise the security of these devices and threaten the function and safety of the respective facilities where they are used. Seattle, USA (PRWEB) August 12, 2013 IOActive, Inc., the leading global provider of specialist information security services, today announced that Reid Wightman, a security consultant for the company, will present at Seattle’s embedded device security conference (EDSC) on industrial...

2013-08-12 23:17:04

Executive and project nominees announced for the 2013 ISE® Northeast Awards. People’s Choice Award voting now open to industry at large. Atlanta, GA (PRWEB) August 12, 2013 T.E.N., a technology and information security executive networking and relationship-marketing firm, announced today the nominees vying for the 2013 Information Security Executive® and Project of the Year Awards in the Northeast U.S. Region. Executives include top-ranking decision makers representing...