Microsoft ships a fix for a troubling Internet Explorer zero day vulnerability in the March edition of Patch Tuesday. The release also marks the end of support for Windows XP.
Browsing Category: Vulnerabilities
Hackers hurried to exploit a critical Internet Explorer zero day vulnerability before it was to be fixed by Microsoft’s March Patch Tuesday release.
Apple has fixed a slew of vulnerabilities that could lead to code execution on the iPhone, along with a number of other security vulnerabilities in the latest version of its mobile operating system, iOS 7.1. The new release comes just a little more than two weeks after Apple released iOS 7.06 to fix the SSL certificate validation error.
There’s a serious security flaw in some of Cisco’s wireless routers that could allow a remote attacker to take complete control of the router. The bug is in a number of the Cisco small business routers, as well as a wireless VPN firewall. Cisco has released patches to fix the vulnerability in its Wireless-N VPN[...]
The GnuTLS bug is being joined at the hip to the recent Apple goto fail bug, but experts hoping to stem off confusion say the two vulnerabilities are different despite having the same consequences.
A critical vulnerability in GnuTLS, a popular open source crypto library, puts hundreds of software packages including popular Linux distribution at risk.
Google has fixed 19 security flaws in its Chrome browser, including more than a dozen high-risk bugs. The company paid out $3,500 in rewards to security researchers who reported flaws. Two of the high-risk vulnerabilities fixed in Chrome 33 are use-after-free flaws, one in SVG images and the other in speech recognition. There’s also a[...]
The burgeoning evolution of “Internet of Things” has prompted Cisco to issue a challenge to programmers to address these security issues before they go on to become bigger problems.
More than 300,000 home and small office routers were compromised in large-scale attacks that altered DNS configurations and redirected traffic to attacker-controlled sites.
Oracle’s Demantra is fraught with vulnerabilities that could allow an attacker to extract sensitive information, carry out phishing attacks, and modify content within the application, among other attacks.