Hackers have begun actively targeting a vulnerability in Internet Explorer 7 that was patched earlier this month by Microsoft. The bug cyber-criminals are looking to exploit is a remote code execution vulnerability that lies in the way Internet Explorer 7 handles errors when attempting to access deleted objects. According to Trend Micro, attackers are spamming […]
Embarcadero Technologies has no shortage of competitors when it comes to database and application developer tools. But a new product licensing strategy may help the company broaden its footprint in the space. The company is launching what it calls Embarcadero All-Access, an on-demand licensing model that makes all of its design and development tools available […]
A security researcher is backing away from a warning he issued about the Google Android operating system. Charles Miller, principal security analyst at Independent Security Evaluators, discovered a vulnerability in the multimedia subsystem Android uses for its browser. The bug, which exists in PacketVideo’s OpenCore media library, is an integer underflow during Hoffman decoding that […]
A security researcher is recommending that users approach the browser on the T-Mobile G1 phone with caution until a patch for a recently publicized vulnerability is deployed. Charles Miller, who revealed technical details of the bug at ShmooCon, held Feb. 6 to 9 in Washington, said users should either steer clear of the browser or […]
Microsoft has teamed with Symantec, AOL and other industry leaders to battle the Conficker worm. Working with security researchers, ICANN (Internet Corporation for Assigned Names and Numbers) and operators within the domain name system, Microsoft has coordinated a response designed to disable domains targeted by Conficker. Microsoft also announced a $250,000 reward for information that […]
Valentine’s Day may be a time for love, but spammers and malware writers are having their fun too. While reports of the percentage of spam related to Valentine’s Day versus overall spam have been varying somewhat from vendor to vendor, what the security community seems to agree on is that a botnet called Waledac is […]
It’s been roughly a year since Sun Microsystems acquired MySQL AB and brought the open-source database into its portfolio. A lot has happened in the ensuing months, from the release of MySQL 5.1 to the resignations of two prominent names long associated with MySQL, Monty Widenius and Marten Mickos. But there are even more changes […]
Microsoft issued four security bulletins for February’s Patch Tuesday release in order to plug a number of remote code execution vulnerabilities in its products. Two of the bulletins are rated “critical.” Arguably the one with the greatest impact is MS09-003, which addresses two bugs affecting Microsoft Exchange Server. The first vulnerability could allow remote code […]
CA has released a new version of its risk management tool with a broader set of features meant to help companies take a more comprehensive approach to risk management and compliance. In CA GRC Manager 2.0, CA has included a common risk management framework designed to provide a uniform set of risk-related metrics, assessment processes, […]
CA GRC Manager 2.0 Looks to Bring Uniformity to Risk Management by Brian PrincePhotos Courtesy of CA. Risk Review Dashboard Using the Risk Monitor dashboard, an administrator can view the state of a given risk within the organization and determine its likelihood, its impact severity and how it is trending. Risk Tracking Dashboard With the […]