Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Security News

Security News

Protect your Computers, Business Networks and Websites from Intrusion and Malicious Scripts
Security News
Vuln: Oracle Hyperion Analytic Provider Services CVE-2014-4246 Remote Security Vulnerability (SecurityFocus Vulnerabilities) - http://www.securityfocus.com/bid...
Security News
ISC StormCast for Wednesday, July 16th 2014 http://isc.sans.edu/podcast..., (Tue, Jul 15th) (InternetStormCenter) - https://isc.sans.edu/diary...
Security News
Security Against Traffic Analysis of Cloud Data Access (Schneier blog) - https://www.schneier.com/blog...
Security News
These are the absurd names British intelligence spies have to remember to spy on you (Yahoo Security) - http://news.yahoo.com/absurd-...
Security News
PayPal Fixes Application-Side Filter Vulnerability (July 14, 2014) (SANS Newsbites) - http://www.sans.org/newslet...
Security News
"An Architectural Introduction to the LISP Location-Identity Separation System" - Damien Saucez, Albert Cabellos-Aparicio (Internet Drafts) - http://tools.ietf.org/html...
Security News
Is use-after-free exploitation dead? The new IE memory protector will tell you - http://blog.fortinet.com/Is-use-...
The Isolated Heap for DOM objects included in the Microsoft Patch Tuesday for June 2014 was just a fire drill aimed at making the exploitation of use-after-free (UAF) vulnerabilities more difficult. The patch for July 2014, however, has been quite a shock to exploit developers! In this release, Microsoft showed some determination in fighting back against UAF bugs with this improvement - the introduction of a new memory protector in Microsoft Internet Explorer, which would make exploitation of...
Security News
17-Year-Old Responsible for Attacks on Banks and Other Companies in Norway (July 11, 2014) (SANS Newsbites) - http://www.sans.org/newslet...
Security News
Metadata redefinition 1: what and why? (IT Toolbox Blogs) - http://it.toolbox.com/blogs...
Security News
Vuln: WordPress BSK PDF Manager Plugin 'wp-admin/admin.php' Multiple SQL Injection Vulnerabilities (SecurityFocus Vulnerabilities) - http://www.securityfocus.com/bid...
Security News
Suspect in US $14 Million ATM Heist Scheme Agrees to Plea Deal (July 14, 2014) (SANS Newsbites) - http://www.sans.org/newslet...
Security News
Mandatory data breach laws back on Australian agenda (The Register) - http://go.theregister.com/feed...
Security News
Bugtraq: security bulletin HPSBGN03068 rev.1 - HP OneView running OpenSSL, Remote Denial of Service (DoS), Unauthorized Access, Disclosure of Information (SecurityFocus Vulnerabilities) - http://www.securityfocus.com/archive...
Security News
Automating Manufacturing: Reducing ERP Inventory Replenishment Errors (IT Toolbox Blogs) - http://it.toolbox.com/blogs...
Security News
CVE-2014-4211 (Natl. Vulnerability Database) - http://web.nvd.nist.gov/view...
Security News
Vuln: Oracle Java SE CVE-2014-4263 Remote Security Vulnerability (SecurityFocus Vulnerabilities) - http://www.securityfocus.com/bid...
Security News
Hackers Steal Personal Information of US Security-Clearance Holders (Schneier blog) - https://www.schneier.com/blog...
Security News
Toolbox.com Information Leak (IT Toolbox Blogs) - http://it.toolbox.com/blogs...
Security News
Cisco Wireless Residential Gateway Remote Code Execution Vulnerability - http://tools.cisco.com/securit..., (Thu, Jul 17th) (InternetStormCenter) - https://isc.sans.edu/diary...
Security News
Skiddes turn Amazon cloud into 'crime-as-a-service' security bod (The Register) - http://go.theregister.com/feed...
Security News
Hamas hacks Israeli TV sat channel to broadcast pics of Gaza wounded (The Register) - http://go.theregister.com/feed...
Security News
Apple, IBM team up in mobile devices, applications (Yahoo Security) - http://news.yahoo.com/apple-i...
Security News
Vuln: PHP 'ext/spl/spldllist.c' Local Denial of Service Vulnerability (SecurityFocus Vulnerabilities) - http://www.securityfocus.com/bid...
Security News
CVE-2014-1474 (email::address::list, rt) (Natl. Vulnerability Database) - http://web.nvd.nist.gov/view...
Security News
IT Management Daily News Digest for July 15, 2014 (IT Toolbox Blogs) - http://it.toolbox.com/blogs...
Security News
Vuln: Microsoft DirectX DirectShow CVE-2014-2780 Local Privilege Escalation Vulnerability (SecurityFocus Vulnerabilities) - http://www.securityfocus.com/bid...
Security News
Hungry, Hungry Botnets: A look at Torpig - http://blog.fortinet.com/Hungry-...
Every 60 seconds 47,000 applications are downloaded off the internet! Evidently, most of us don’t think twice about downloading a song, widget, app, image or even malware. Downloading is so second nature to us that a popular phishing scheme thrives on our carefree downloading reflex. Say hello to Torpig. A “drive-by download” is when a website suddenly prompts you to do something, such as a “click here to close this ad.” Many unsuspecting web surfers simply hi...
Security News
Risks of Keyloggers on Public Computers (Schneier blog) - https://www.schneier.com/blog...
Security News
Stay Up to Date on the Top IT News Topics (IT Toolbox Blogs) - http://it.toolbox.com/blogs...
Security News
CVE-2013-5567 (adaptivesecurityappliancesoftware) (Natl. Vulnerability Database) - http://web.nvd.nist.gov/view...
Other ways to read this feed:Feed readerFacebook