Vulnerabilities

If You’re Only as Strong as Your Allies, Should You Trust Third-Party Code?

Jim Ivers  wrote an interesting post about If You’re Only as Strong as Your Allies, Should You Trust Third-Party Code? that I would like to share. “Doing business is a highly interactive endeavor and software is increasingly at the heart of those interactions. Agility becomes a key component of staying competitive, so organizations are seeking allies […]

Cryptsetup Flaw Exposes Linux Systems to Attacks

Eduard Kovacs  wrote an interesting post about Cryptsetup Flaw Exposes Linux Systems to Attacks that I would like to share. “A vulnerability in the disk encryption utility Cryptsetup can expose some Linux systems to local and remote attacks, but the developers of the affected distributions see it as a low-risk issue. The flaw, discovered by researchers […]

IoT Malware Will Soon Surround Us: Researcher

Ionut Arghire wrote an interesting post about IoT Malware Will Soon Surround Us: Researcher that I would like to share. “When it comes to Internet of Things (IoT) devices, everything from smart glasses to connected cars is susceptible to malware infection if not properly secured, Fortinet senior researcher Axelle Apvrille said in a presentation at the DefCamp […]

Google Patches 23 Critical Vulnerabilities in Android

 Ionut Arghire wrote an interesting post about Google Patches 23 Critical Vulnerabilities in Android that I would like to share. “Google on Monday released its November 2016 Android security patches to resolve 83 vulnerabilities in the mobile operating system, 23 of which have been rated Critical. Of the 83 bugs, 37 were rated High risk, 22 […]

The Connected Conundrum: Why I No Longer Trust My Toaster

Jim Ivers  wrote an interesting post about The Connected Conundrum: Why I No Longer Trust My Toaster that I would like to share. “On Friday, October 21, the Internet slowed to a crawl. A new botnet attack, called Mirai, executed a distributed denial-of-service (DDoS) attack against DNS provider Dyn. The result impacted service for some of the […]

Ongoing Use of Windows Vista, IE8 Pose Huge Enterprise Threat

Kevin Townsend  wrote an interesting post about Ongoing Use of Windows Vista, IE8 Pose Huge Enterprise Threat that I would like to share. “A new report highlights the high number of users still operating outdated Windows operating systems and unsupported browsers. This represents a huge threat to the organizations whose users access company networks from insecure […]

Belkin WeMo Devices Expose Smartphones to Attacks

Eduard Kovacs wrote an interesting post about Belkin WeMo Devices Expose Smartphones to Attacks that I would like to share. “Researchers Find Vulnerabilities in Belkin WeMo Home Automation Products Researchers from Invincea have identified serious vulnerabilities in Belkin WeMo home automation devices and their associated Android application. The vendor has fixed the mobile app and […]

VMware Flaws Allow Security Bypass on Mac OS X

Eduard Kovacs wrote an interesting post about VMware Flaws Allow Security Bypass on Mac OS X that I would like to share. “VMware has patched a couple of moderate-severity information disclosure vulnerabilities affecting some of the company’s Mac OS X products. Marco Grassi of Tencent’s KeenLab discovered that VMware Tools versions 9.x and 10.x have a […]

Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!