MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 23, 2008
Sean Michael Kerner
New Zero-Day Exploit Emerges for Microsoft SQL Microsoft issues warning for attack vector that could paralyze database servers. mark for My Articles similar articles
InternetNews
February 5, 2010
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. mark for My Articles similar articles
InternetNews
April 12, 2005
Michael Singer
Oracle Security Updates Include PeopleSoft Fixes The company issued 15 separate patches for multiple security vulnerabilities, but older flaws still loom. mark for My Articles similar articles
InternetNews
March 25, 2008
Sean Michael Kerner
Report: 90% of Web Sites Vulnerable to Hackers New study claims Cross-Site Scripting attacks are all over the place. Should we be afraid? mark for My Articles similar articles
InternetNews
December 3, 2010
IBM Refreshes AppScan to Secure Input Validation New release of AppScan platform - version 8 - from IBM targets cross-site scripting and SAL injection vulnerabilities with string analysis for secure coding. mark for My Articles similar articles
InternetNews
October 17, 2008
Richard Adhikari
Adobe Sites Hit by Malware Just weeks after a BusinessWeek Web site was hit by an SQL injection attack, comes news that Adobe has had to deal with two of its Web sites compromised the same way. mark for My Articles similar articles
InternetNews
May 13, 2004
Ryan Naraine
Symantec Scrambles to Fix Firewall Flaws Users of Symantec's popular firewall product suite are at risk of code execution attacks. mark for My Articles similar articles
InternetNews
February 20, 2009
Richard Adhikari
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. mark for My Articles similar articles
PC Magazine
November 11, 2003
The Lookout: New Critical RPC Flaws Nearly a month to the day after the Blaster worm began tearing through the Internet, Microsoft Corp. reported three newly identified flaws in the Windows RPC protocol, two of which are quite similar to the one that Blaster attacks. mark for My Articles similar articles
InternetNews
February 14, 2011
Oracle Tunes Up Database Security With Firewall In a bid to shore up the security of crucial IT assets, Oracle has unveiled its Database Firewall product, which seeks to guard against SQL injections and other database attacks. mark for My Articles similar articles
PC World
November 20, 2002
Paul Roberts
'Critical' Windows, IE Hole Plugged Microsoft urges users to download patch for flaw that permits intruder access. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
InternetNews
October 16, 2007
Andy Patrizio
A New Way to Hack Yourself Core Security Technologies updates its intrusion detection software to simulate outside attacks on your network and see how far the bad guys can get. mark for My Articles similar articles
InternetNews
September 1, 2004
Ryan Naraine
Oracle Patch Day: Critical Flaws Fixed Security patches released for multiple 'high risk' flaws in Oracle's enterprise-focused products. mark for My Articles similar articles
InternetNews
February 14, 2006
Ed Sutherland
Microsoft's Security Valentines As part of its traditional "patch Tuesday," Microsoft has released seven fixes for its media player and other Windows applications. mark for My Articles similar articles
InternetNews
September 29, 2004
Ryan Naraine
Real Plugs Media Player Holes The company released patches to protect RealPlayer users from code execution attacks. mark for My Articles similar articles
InternetNews
February 2, 2009
Richard Adhikari
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. mark for My Articles similar articles
InternetNews
December 16, 2008
Sean Michael Kerner
'Shockers' in Cisco's Year-End Security Report But it's what didn't make it into the report that could be even more revealing. mark for My Articles similar articles
InternetNews
May 18, 2009
Alex Goldman
Legit Sites Riskier Than Web's Back Alleys New reports say that while users may fear fly-by-night Web sites, they're more likely to be infected by the sites they trust. mark for My Articles similar articles
Bank Technology News
September 2009
Rebecca Sausner
Everything That Can Go Wrong The aftermath of the breach of Albert Gonzalez has had some positive effects. mark for My Articles similar articles
InternetNews
November 28, 2006
Ed Sutherland
Google Catches Phishing Flaw in Appliances Security experts are warning the computing world about a new security vulnerability in Google's Search Appliance and Google Mini device that may yield more phishing attacks. mark for My Articles similar articles
InternetNews
July 20, 2004
Ryan Naraine
Windows 2000 Exploit Code Released Exploit code for a known security flaw in Microsoft Windows 2000 has been posted online, putting millions of users at risk of a PC hijack. Apply those MS04-019 and MS04-022 security patches as needed. mark for My Articles similar articles
InternetNews
December 23, 2004
Clint Boulton
Patching Oracle, IBM For The Holiday Security experts at U.K.-based Next Generation Security Software brought tidings of security vulnerabilities in Oracle and IBM software in time for the Christmas holiday. mark for My Articles similar articles
PC World
June 27, 2002
Joris Evers
Windows Media Player Flaw Puts PCs at Risk Security hole in media player's antipiracy feature could allow hackers to access your computer. mark for My Articles similar articles
Military & Aerospace Electronics
July 2005
Adam Kolawa
Reducing software security vulnerabilities through unit testing Buffer overflows are the most common type of attack to exploit military and aerospace systems, but common industry best practices -- like unit testing and coverage analysis -- can help prevent these attacks. mark for My Articles similar articles
InternetNews
January 16, 2008
Andy Patrizio
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. mark for My Articles similar articles
InternetNews
April 15, 2009
Alex Goldman
Oracle Issues 43 Patches, Nails Database Exploits Oracle's latest patch update fixes critical flaws in two key software products and other flaws across the product line, but Oracle could do more to help administrators. mark for My Articles similar articles
InternetNews
August 27, 2009
IBM's X-Force Report Praises Sun for Fast Fixes Security report on trends in vulnerabilities, threats, spam, and phishing finds Sun has passed Microsoft in terms of reporting and fixing OS problems. mark for My Articles similar articles
CIO
November 1, 2003
Scott Berinato
FrankenPatch The more you patch, the more you need to patch, and the more kludgy and terrifyingly unpredictable your systems and applications become. Is there any way to escape this horror? mark for My Articles similar articles
InternetNews
July 19, 2006
Sean Michael Kerner
Oracle's 65 Flaw Update Oracle's July Critical Patch Update is now out with fixes for a whopping 65 bugs. mark for My Articles similar articles
InternetNews
February 10, 2009
Sean Michael Kerner
Microsoft Fixes IE in February Patch Update A total of eight vulnerabilities get Microsoft's attention, as does an old botnet. mark for My Articles similar articles
PC Magazine
May 1, 2010
Albanesius & Rhey
Anatomy of a Hack In late March, a chapter was closed with little fanfare on the biggest case of online identity theft in U.S. history. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
June 19, 2007
Clint Boulton
HP 'SPIs' Web Application Security HP sets its sights on Web application software maker SPI Dynamics. mark for My Articles similar articles
CIO
May 15, 2003
Scott Berinato
The Bugs Stop Here Don't blame Microsoft. Don't blame the hackers. Blame yourself for insecure software. Better yet, stop blaming and start moving toward operational excellence. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
InternetNews
June 16, 2011
Mesh Injection Attack Claims 30,000 Sites Meshed Web attack emerges that takes a new approach to replication and it may already be a big problem. mark for My Articles similar articles
InternetNews
January 30, 2007
Clint Boulton
SPI Lets 'Phoenix' Fly For Web Security SPI Dynamics created Phoenix, a new Web application security architecture to analyze Web 2.0 applications and find previously undetectable Web flaws. mark for My Articles similar articles
InternetNews
October 5, 2009
HP Hacking Challenge Yields Surprising Results If you thought automated security tools were enough, think again. mark for My Articles similar articles
InternetNews
November 22, 2004
Jim Wagner
More Fortification For Code Seven months after opening for business, officials at Fortify Software announced improvements to its analysis tool for weeding out code that leads to application hacks. mark for My Articles similar articles
InternetNews
February 9, 2010
McAfee Finds Spike In Malware From China A new study by security software vendor McAfee finds a growing number of cyber attacks originating in China and predicts even more malware scams will target fans of popular social networking sites like Facebook and Twitter. mark for My Articles similar articles
InternetNews
April 12, 2011
HP Fortifies Real Time Security New HP Fortify Real-Time Hybrid Analysis solution takes aim at dynamic threats. mark for My Articles similar articles
InternetNews
December 12, 2008
Sean Michael Kerner
Microsoft Expands Zero-Day IE Warning As reports of attacks in the wild come in, Microsoft says IE 7 is not the only vulnerable version of its browser. mark for My Articles similar articles
InternetNews
January 12, 2009
Richard Adhikari
Avoiding the Most Common Programming Errors These mistakes show that the bad guys aren't necessarily skilled as they are simply exploiting your errors. mark for My Articles similar articles
InternetNews
June 11, 2004
Ryan Naraine
Buffer Overflows Patched in RealPlayer A buffer overflow vulnerability in RealNetworks' flagship RealPlayer software could put millions of users at risk of PC takeover, the company warned in an advisory. mark for My Articles similar articles
Bio-IT World
September 11, 2003
Philip D. Quarles
Safeguarding the Security of Clinical Data Given the frequency of Web site attacks, can data be safely stored on a server connected to the Internet? Yes, provided that the application is properly designed and the network and server properly secured. mark for My Articles similar articles
InternetNews
September 9, 2008
Sean Michael Kerner
Microsoft Updates for Media Vulnerabilities Be careful what you listen to on your PC. Hackers may want to get it. mark for My Articles similar articles
PC Magazine
December 20, 2006
Robert Lemos
The New Security Threats More secure operating systems mean that attackers are looking elsewhere for holes to sneak through. mark for My Articles similar articles
InternetNews
August 16, 2005
Sean Michael Kerner
OS X Takes Hit Apple releases massive patch addressing more than 40 different vulnerabilities in OS X. mark for My Articles similar articles
InternetNews
December 10, 2009
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. mark for My Articles similar articles