Why do You need a Vulnerability Risk Assessment? |
|
|
Written by Rebecca Mints
|
Tuesday, 25 March 2008 08:27 |
Frequently the decision to employ new technology is made hastily in an effort to maximize profitability without giving consideration to securing the new technology. The network architects design what’s needed and the IT department builds it. New technology is constantly added as well. Added to what may be an already weakly secured frame, thus making it weaker with every new addition. As the environment becomes more and more complex, if things are haphazardly thrown together it becomes more and more difficult to secure the environment. It’s not only much more susceptible to cyber criminals, but also to technical failure such as unpatched software with published security flaws remaining in use or any other number of security lapses. |
Read more...
|
|
Microsoft Word Vulnerability |
|
|
Written by Rebecca Mints
|
Monday, 24 March 2008 11:11 |
Last Friday Microsoft issued a security advisory that suggests there is a vulnerability in their Word product. Microsoft said they are conducting an investigation of some "very limited, targeted attacks using a vulnerability in the Microsoft Jet Database Engine that can be exploited through Microsoft Word." Access to data is open to many Microsoft and third-party applications via the Microsoft Jet Database Engine, including Microsoft Visual Basic, Microsoft Access, and some Information Services (IIS) applications. |
Read more...
|
iPhoto and Apple Aperture Vulnerability |
|
|
Written by Rebecca Mints
|
Thursday, 20 March 2008 18:00 |
Apple Aperture and iPhoto are susceptible to a new vulnerability, and successful exploitation would allow remote hackers to compromise a vulnerable system. While processing malformed Adobe Digital Negative (DNG) image files a buffer overflow error can occur, which would allow an attacker to crash an affected application or execute arbitrary code by getting the host to open a carefully crafted image.
|
Read more...
|
|
Internet Sites Blocked in Tibet |
|
|
Written by Rebecca Mints
|
Thursday, 20 March 2008 09:25 |
After the riots in Tibet, which have resulted in the deaths of more than 80 people, the Chinese government has blocked access to various Internet websites such as YouTube, Google News, BBC, CNN, and Yahoo News, according to the Tibetan government. This has been done in an effort to curb the spread of videos depicting the brutality. The riots have stemmed from demonstrations in Tibet's capital city Lhasa on March 10. It was the anniversary of a 1959 uprising against the Chinese government that led to the Dalai Lama fleeing to India. |
Read more...
|
Hacking Contest |
|
|
Written by Rebecca Mints
|
Tuesday, 18 March 2008 18:00 |
CanSecWest, a security conference held in Vancouver, British Columbia, is holding another contest this year called "PWN to Own." The competition is to see who can exploit a preauthentication code-execution vulnerability in a default service on one of three notebooks: one running Windows Vista Ultimate, one Mac OS X 10.5 and the last with Ubuntu Linux. First prize is $10,000 and the winner also gets to keep the machine they hack. |
Read more...
|
|
|
|
|
Page 26 of 33 |