Results 1 - 10 of about 74:

Brian Donohue / Threatpost:
WordPress plugin SEO by Yoast, downloaded over 14M times, fixes SQL injection vulnerability   —  SQL Injection Bug Fixed in Popular WordPress SEO Plug-In  —  SEO by Yoast, a popular search engine optimization plug-in for WordPress, has fixed a pair of blind SQL injection vulnerabilities …
Mar 13, 2015, 6:15 AMIn context
Chris Brook / Threatpost:
Dropbox Patches Remotely Exploitable Vulnerability in SDK   —  Developers at Dropbox recently fixed a remotely exploitable vulnerability in the Android SDK version of the storage app that enabled attackers to connect applications to a Dropbox account without the user's consent.
Mar 12, 2015, 10:35 AMIn context
Michael Mimoso / Threatpost:
Microsoft Patches Old Stuxnet Bug, FREAK Vulnerability   —  Windows IT shops figure to be in for some scrambling today.  Not only was it revealed that a five-year-old patch for a vulnerability exploited by Stuxnet was incomplete and machines have been exposed since 2010 …
Mar 10, 2015, 8:25 PMIn context
Dennis Fisher / Threatpost:
Google turns annual Pwnium bug-hunting contest into year-round program with unlimited rewards   —  Google Pwnium Program Now Open All Year  —  Google is expanding its successful Pwnium vulnerability reward program-which has run at various security conferences for a couple of years …
Feb 24, 2015, 11:30 PMIn context
Dennis Fisher / Threatpost:
Canary Watch Site Launches to Track Warrant Canaries   —  In the years since Edward Snowden began putting much of the NSA's business in the street, including its reliance on the secret FISA court and National security Letters, warrant canaries have emerged as a key method for ISPs …
Feb 9, 2015, 1:55 AMIn context
Michael Mimoso / Threatpost:
Cisco report: 1,800 compromised domains serving Flash zero day exploit   —  1,800 Domains Overtaken by Flash Zero Day  —  When the Blackhole exploit kit went away after the arrest of its alleged creator and maintainer Paunch, there were questions about which kit would rise up as its successor.
Feb 4, 2015, 7:35 AMIn context
Brian Donohue / Threatpost:
Report: automated tank gauges at over 5,000 US gas stations are vulnerable to remote hacks   —  Thousands of US Gas Stations Vulnerable to Remote Hacks  —  The gauges that detect and prevent fuel leaks at more than 5,000 gas stations in the United States are utterly vulnerable to remote attacks …
Jan 24, 2015, 1:55 AMIn context
Dennis Fisher / Threatpost:
Adobe investigating reported Flash zero-day vulnerability used by Angler exploit kit   —  Exploit for Flash Zero Day Appears in Angler Exploit Kit  —  The dangerous Angler exploit kit has a new piece of ammunition to use in its attacks: a fresh Adobe Flash zero-day vulnerability.
Jan 21, 2015, 8:30 PMIn context
Michael Mimoso / Threatpost:
Gitrob Combs Github Repositories for Secret Company Data   —  Free online code repositories such as GitHub provide a valuable collaboration service for enterprise developers.  But it's also a trove of potentially sensitive company and project information that's likely to warrant attention from hackers.
Jan 14, 2015, 9:40 AMIn context
Michael Mimoso / Threatpost:
Microsoft service for early Patch Tuesday notifications now available only to paying customers   —  Microsoft Limits Advanced Patch Notifications to Premier Customers  —  Microsoft today pulled the plug on its Advanced Notification Service (ANS), offering it going forward only to paying Premier customers.
Jan 9, 2015, 2:20 PMIn context

Sponsor Posts

Lightning strike electrifies tribal community's mission to improve tech, empower its citizens  —  Today, the Pokagon Band of Potawatomi is using Microsoft technology in almost every area of a tribal citizen's life …
Winning Pricing Strategies for Software, IoT and Digital Goods  —  With every industry going digital, it's clear that value has shifted from hardware to software and services.  As new digital goods and services emerge …
Internet & Digital Addiction: Finding Balance with the reSTART Recovery Program  —  Many words can be used to describe the digital age: Transformative and fast come easily, and frequently, to mind.  Further down the list is extreme.
5 Reasons to automate your HR  —  Behind every successful business is an effective Human Resource department.  They ensure that your goals are reached by engaging your company's most important asset - your People!