Search the Community
Showing results for tags 'vulnerability'.
A newly disclosed vulnerability could allow attackers to seize control of mobile phones and key parts of the world's telecommunications infrastructure and make it possible to eavesdrop or disrupt entire networks, security experts warned Tuesday. The bug resides in a code library used in a wide range of telecommunication products, including radios in cell towers, routers, and switches, as well as the baseband chips in individual phones. Although exploiting the heap overflow vulnerability would require great skill and resources, attackers who managed to succeed would have the ability to exe
Security holes and vulnerabilities are to be expected, but not enough is being done to patch holes quickly enough. This is the conclusion of Heimdal Security who conducted analysis of software vulnerabilities. The security firm found that while security problems are on the increase, companies are failing to keep pace and issues remain unaddressed for too long. It's something that hackers are taking advantage of, and user data is being left at great risk. Heimdal Security found that between 60 and 90 percent of attacks from hackers take advantage of this fact. A number of key culprits are s
We reported earlier this week on how financial organizations are at risk from third parties with compromised security. It seems that the same thing applies to software. The latest review by IT security specialist Secunia shows that third-party programs are responsible for 76 percent of the vulnerabilities discovered in the 50 most popular programs in 2013. Secunia's review looks at the top 50 programs found on private PCs including those approved and maintained by IT departments and on those BYOD devices used with or without permission. Unsurprisingly 66 percent of the top 50 are Micro
The Internet Storm Center on Saturday boosted its threat level to "Yellow," indicating a "significant new threat" to Internet users from attacks exploiting an unpatched vulnerability in all versions of Microsoft's Internet Explorer (IE) browser. "The Internet Storm Center is beginning to see increased evidence of exploits in the wild regarding Microsoft Security Advisory 2887505," the security organization said on its website. "Accordingly, we're moving the InfoCon up to Yellow." Microsoft's advisory, published Sept. 17, acknowledged that hackers were exploiting Internet Explorer 8 (IE