After further analysis, researchers at Symantec have determined a patch issued by Adobe to address a bug in Flash Player is effective across all platforms. Researchers there initially thought the patch did not work on the standalone Adobe Flash Player version 9.0.124.0 on Linux because it displayed behavior researchers thought was suspect. Adobe issued a […]
Officials at Adobe are investigating a reported bug in Flash Player that hackers have used to compromise thousands of Web sites. This kind of issue is becoming more prevalent as enterprise customers use browser plug-ins and other online applications. According to Symantec, the bug being exploited is the patched CVE 2007-0071, a flaw that can […]
Hewlett-Packard is taking a software-as-a-service approach to security in its latest push to help organizations secure their Web applications. The company has plans to launch a service it calls the HP Assessment Management Platform in August to help customers centralize all of their Web application security analysis programs into a complete solution maintained and managed […]
Passlogix is pushing single sign-on into the cloud with an on-demand version of its v-GOSign-On Platform. v-GO On Demand is aimed at easing the deployment of single-sign technology for remote workers by allowing it to be distributed online or pre-loaded on USB memory sticks for employees using multiple PCs or those who need temporary access, […]
IT Security Is Dead- IT Security Is Dead- IT Security Is Dead- IT Security Is Dead- IT Security Is Dead- IT Security Is Dead- IT Security Is Dead- IT Security Is Dead- IT Security Is Dead- IT Security Is Dead- IT Security Is Dead- Worst Data Breaches EverThe Most Poisonous BugsEight Top Security ConcernsThe Security […]
Google expanded its efforts to secure users of its search engine following a McAfee-Yahoo partnership to do the same for Yahoo users. Google quietly launched the Safe Browsing Diagnostic Page to help Web masters by answering four questions: the current listing of the site what happened when Google visited the site whether it is hosting […]
If the experiences of some certificate authorities are any indication, fallout from a vulnerability affecting Debian-based encryption keys has not rippled out as far among enterprises as some have feared-yet. Some CAs issuing replacement certificates free of charge to enterprises affected by the flaw reported that enterprises have not jumped at their offers for a […]
Patches for three publicly disclosed bugs affecting Apple’s iCal application have yet to become a reality. The bugs are related to the improper sanitizing of certain fields of iCal calendar files, and can be exploited to launch denial-of-service attacks or to take over vulnerable machines. The vulnerabilities were uncovered in January by researchers from Core […]
Researchers at Core Security Technologies have uncovered three vulnerabilities in Apple’s iCal application that hackers can exploit to take over vulnerable machines or launch denial-of-service attacks. According to an advisory from Core, the most serious of the bugs is the result of a memory corruption vulnerability that can be triggered if a user runs a […]
Three years after its founding, Aster Data Systems has emerged from stealth mode with an Internet-scale, massively parallel processing database and a well-known customer-MySpace. Dubbed Aster nCluster, the product is aimed at overcoming the price and performance challenges of large-scale data warehouses. At the core of the nCluster architecture are algorithms and processes that control […]