Quantcast

Latest Vulnerability Stories

2014-06-11 08:36:42

POTSDAM, Germany, June 11, 2014 /PRNewswire/ -- Have cybercriminals stolen my personal data and made them freely available online so that others might also access and misuse them? Internet users all over the world can now answer this question using a free service from the Hasso Plattner Institute for IT Systems Engineering (http://www.hpi.de) at the University of Potsdam in Germany. All they need to do is visit https://sec.hpi.de and enter their e-mail address. The system will...

2014-06-09 08:33:44

Highly skilled research team provides tools for effective and continuous response to today's most damaging threats ATLANTA, June 9, 2014 /PRNewswire/ -- Lancope, Inc., a leader in network visibility and security intelligence, announces that its security research team, StealthWatch(®) Labs, has conducted advanced research to provide cutting-edge protection against recent, destructive cyber-attacks including Heartbleed and CryptoLocker. Through unique, behavioral-based threat...

2014-06-06 12:26:14

BANGALORE, India, June 6, 2014 /PRNewswire/ -- SecPod Technologies, a leading information security company, has announced Saner Business, a vulnerability management solution for enterprise computers. In today's complicated cyber world, new approaches are required to ensure computers are secure and remain secure. It is no longer sufficient to simply try to detect and stop cyber attacks. Manageable and cost effective solutions must be deployed to proactively ensure...

openssl heartbleed
2014-06-06 10:18:50

Peter Suciu for redOrbit.com - Your Universe Online This week, new security holes were reportedly uncovered in the same software that was responsible for the insidious "Heartbleed" bug, which may have left as many as 500,000 websites vulnerable to attacks in April. While the newly discovered bugs are not believed to be as serious as the Heartbleed bug, and could be harder to exploit by hackers, the problem continues to affect OpenSSL – which is used by many tech companies including...

2014-06-04 16:20:44

New study analyzes security vulnerabilities of Keystone XL and the threat posed to nearby agricultural lands and waterways WASHINGTON, June 4, 2014 /PRNewswire/ -- The first-ever threat assessment of the proposed Keystone XL pipeline highlights the potential security vulnerabilities. The report finds that the pipeline has a high-risk of being exploited and could easily cause a catastrophic spill of more than seven million gallons of toxic tar sands "dilbit" into surrounding farmlands and...

2014-06-04 08:40:41

Dramatically reduces costs associated with releasing secured code as part of a Secure SDLC (SSDLC) LOS ANGELES, June 4, 2014 /PRNewswire/ -- Prevoty, Inc., a new security software company providing a radical real-time application security capability for enterprises, today announced support for private clouds for the company's flagship Prevoty Enterprise suite. While the majority of enterprises understand the value in using an SSDLC methodology to develop more secure applications,...

2014-05-29 23:10:55

New Vulnerability Management Package Targets Midmarket Organisations Portland, OR (PRWEB) May 29, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the availability of Tripwire® IP360TM Express Bundle 1600 in the U.K. The Tripwire IP360 Express Bundle 1600 is a competitively priced vulnerability management package specifically designed for small to medium-sized businesses and channel partners. Information...

2014-05-29 23:02:44

Network Penetration Testing provides security for an overlooked essential requirement for HIPAA Compliance for at-risk practices and medical industry fields as well as at-risk corporate entities. 5i Solutions Inc.* offers over 24 years of experience in the field of enterprise management solutions. Fort Lauderdale, FL (PRWEB) May 29, 2014 5i Solutions Inc. announces a 12-year anniversary successfully providing Network Penetration Testing, a safeguard for companies in need of proven...

2014-05-27 23:05:17

Homeowners now have access to comprehensive Do-It-Yourself security system company reviews created by the home security experts at SecuritySystemReviews.com. The reviews offer detailed information that can help owners understand the differences between the leading Do-It-Yourself security system companies and offers tips on finding a great deal. Scottsdale, Arizona (PRWEB) May 27, 2014 As if the fact that intruders and hackers are everywhere in today's fast-paced, technology-driven...

2014-05-21 08:33:26

MONTREAL, May 21, 2014 /CNW Telbec/ - One month following the public announcement of the Heartbleed computer vulnerability, more then 40,000 Canadian systems, some operated by large enterprises remain exploitable. This is the conclusion of research performed by Logicnet and its EVA-Technologies division across 200 millions Internet systems covering Canada, Switzerland and France. As of May 5th, 1.17% of exposed systems in Canada are exploitable, compared with 1.43% in...


Word of the Day
drawcansir
  • A blustering, bullying fellow; a pot-valiant braggart; a bully.
This word is named for Draw-Can-Sir, a character in George Villiers' 17th century play The Rehearsal.
Related