Quantcast
Last updated on April 21, 2014 at 8:55 EDT

Latest Vulnerability Stories

This Is Not A Test: Vulnerability Found In US Emergency Alert System
2013-07-09 13:41:50

Peter Suciu for redOrbit.com - Your Universe Online The United States Emergency Alert System (EAS), which can interrupt TV and radio programming with critical information about national emergencies, could have a critical flaw. The service, which has long been trusted to deliver information during a crisis, reportedly has a major vulnerability that could allow hackers to break into the system and even broadcast fake messages to the United States. Security firm IOActive announced on...

2013-07-09 08:35:58

SAN ANTONIO, July 9, 2013 /PRNewswire/ -- Organizations are waking up to the reality that a dangerous implementation issue could lead to devastating operational disruption by providing hackers the ability to bypass typical security controls and take over cloud based systems. The weakness is due to a set of implementation issues in the Intelligent Platform Management Interface (IPMI), which now comes standard on almost all rack-mount hardware. Digital Defense, Inc. (DDI), a leading...

2013-07-08 08:30:52

Evaluation Based on Completeness of Vision and Ability to Execute SANTA CLARA, Calif., July 8, 2013 /PRNewswire/ -- WhiteHat Security, the Web security company, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the Magic Quadrant for Application Security Testing.* According to the Gartner Magic Quadrant report, "Leaders in the AST market provide breadth and depth of application security testing products and services. The more important is the depth...

2013-06-26 08:35:15

SANTA CLARA, Calif., June 26, 2013 /PRNewswire/ -- WhiteHat Security, the web security company, today announced a patent licensing agreement with Cenzic. Specifically, the agreement extends certain rights to WhiteHat patents, including United States Patent numbers 7,467,402; 8,087,088; 8,281,401 and 8,341,711. "WhiteHat is built on a foundation of innovation. Our technology reflects this and it is why globally recognized brands have chosen WhiteHat for their web security needs,"...

2013-06-25 23:01:47

A-lign Security Senior Auditor/Penetration Tester Chris Berberich is a participant on one of the professional team’s chosen to assist in reviewing code for the 2013 OWASP list. Tampa, FL (PRWEB) June 25, 2013 OWASP is a 501©(3) worldwide not-for-profit charitable organization focused on improving the security of software. The OWASP (Open Web Application Security Project) Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a...

2013-06-25 08:36:56

SAN ANTONIO, June 25, 2013 /PRNewswire/ -- Digital Defense, Inc. (DDI), a leading provider of managed security assessment solutions announced today the launch of an innovative campaign approach to information security education in conjunction with the release of a case study on the organization's security training product, SecurED((TM)). DDI, known for facilitating a holistic approach to information security, encourages organizations to enhance security by addressing the human...

Microsoft Launches Security Bounty Program
2013-06-20 05:30:46

redOrbit Staff & Wire Reports - Your Universe Online Microsoft announced on Wednesday that it will launch a security bounty program that pays as much as $100,000 to anyone that exposes flaws, bugs and security vulnerabilities in its software before and after the products are released. The program will officially kick off on June 26, the same day that Windows 8.1 Preview begins shipping. While companies such as Mozilla, Google and Facebook have similar bounty programs already in...

2013-06-13 23:03:20

intiGrow is offering qualified customers a complimentary two day ISO-27001 gap analysis. A dip stick audit for a gap analysis gives companies brief analysis of how their current security settings and methods match up against ISO-27001 recommendations. Duluth, GA (PRWEB) June 13, 2013 intiGrow is offering qualified customers a complimentary two day ISO-27001 gap analysis. A gap analysis is a detailed assessment of the gap between an organization's information security control, and the...

2013-06-13 16:28:45

Reducing real-world risk is the primary benefit of CSCs, which enjoy high level of support from CEOs and CIOs. BETHESDA, Md., June 13, 2013 /PRNewswire-USNewswire/ -- SANS announces the results of its first-ever survey on the Critical Security Controls (CSCs), sponsored by FireEye, IBM, Symantec and Tenable Network Security. The survey results will be discussed at the SANSFIRE 2013 security training event in Washington, DC, June 17 and the full results will be released during a SANS...

2013-06-12 23:22:32

Ponemon Research Institute 2013 Cost of Breach report identifies malicious and criminal system attacks and system glitches as primary causes of data breaches. Penetration testing would disclose majority of vulnerabilities that allowed information theft. Rochester MI (PRWEB) June 12, 2013 “The ℠gold standard´ for source and cost of data breach information has been Traverse City Michigan´s Ponemon Institute for the last 8 years,” said Barbara Goushaw, Chief...