Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools


News (Page 1 of 219)   1 2 3 4 5 6 7 8 9 10 11  Next >
Browsers feel the fuzz
Security researchers are starting to aim network fuzzers away from servers and toward browsers, finding that dozens of flaws have been missed.
By: Robert Lemos, SecurityFocus 2006-04-12
http://www.securityfocus.com/news/11387

Groups argue over merits of flaw bounties
Vulnerability researchers like getting paid for their research, but software companies criticize the programs. Do vulnerability-purchasing initiatives make sense?
By: Robert Lemos, SecurityFocus 2006-04-05
http://www.securityfocus.com/news/11386

Seven arrested in online fraud crackdown
An ongoing investigation, dubbed Operation Rolling Stone by the U.S. Secret Service, has turned up links to the massive debit-card breaches that have worried banks and consumers.
By: Robert Lemos, SecurityFocus 2006-03-31
http://www.securityfocus.com/news/11385

Patches released for zero-day IE threat
UPDATE: As hundreds of malicious Web sites attempt to exploit the most critical of two Internet Explorer flaws disclosed last week, two third-party firms release fixes to nix the threat.
See also: Thousands download third-party patches
By: Robert Lemos, SecurityFocus 2006-03-28
http://www.securityfocus.com/news/11384

Microsoft offers Apple security advice
Microsoft giving advice to Apple on software security? What next, a lecture on timely shipping of product?
By: Gavin Clarke, The Register 2006-03-24
http://www.securityfocus.com/news/11383

Check Point calls off Sourcefire buy
Citing an ongoing investigation into the deal by the U.S. Treasury Department, the companies decide to call it quits.
By: Robert Lemos, SecurityFocus 2006-03-24
http://www.securityfocus.com/news/11382

Debit-card fraud underscores legal loopholes
UPDATE: Three major data leaks in the last six months are likely responsible for a recent spate of debit-card fraud, but in two cases, no one has come forward to take responsibility. Under current state laws, such silence may be legal.
By: Robert Lemos, SecurityFocus 2006-03-20
http://www.securityfocus.com/news/11381

Virus names likely a lost cause
The Common Malware Enumeration Project clears up confusion for responders, but racing to name the latest virus in the media will continue to be the norm.
By: Robert Lemos, SecurityFocus 2006-03-09
http://www.securityfocus.com/news/11380

Antivirus groups fight over Crossover sharing
A young antivirus group's attempts to leverage a rare exclusive virus discovery into greater membership has earned it criticism from the old guard of antivirus companies.
By: Robert Lemos, SecurityFocus 2006-03-03
http://www.securityfocus.com/news/11379

Triple threat to Mac OS X largely academic
Two worms and an exploit for Apple's operating system hardly threaten consumers' computers, but should act as a wake-up call for Mac users.
By: Robert Lemos, SecurityFocus 2006-02-24
http://www.securityfocus.com/news/11378

News (Page 1 of 219)   1 2 3 4 5 6 7 8 9 10 11  Next >







 

Privacy Statement
Copyright 2005, SecurityFocus