MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
April 26, 2004
Ryan Naraine
'Critical' Windows Hijack Flaw Reported Researchers warn that the boundary error vulnerability in multiple versions of Microsoft's Windows platform could cause a buffer overflow and lead to system takeover. mark for My Articles similar articles
InternetNews
January 11, 2008
Sean Michael Kerner
More Trouble For QuickTime It sounds like a broken record at this point, but QuickTime faces a flaw -- again. mark for My Articles similar articles
InternetNews
January 11, 2006
Sean Michael Kerner
Flaws Hit QuickTime, iTunes There are five highly critical flaws in Apple's QuickTime application that affect both Apple and Windows versions, as well as Apple's popular iTunes application. mark for My Articles similar articles
InternetNews
February 5, 2004
Ryan Naraine
'Critical' RealPlayer Holes Patched RealNetworks patches its flagship media player to fix cross site scripting and system access security vulnerabilities. mark for My Articles similar articles
InternetNews
June 11, 2004
Ryan Naraine
Buffer Overflows Patched in RealPlayer A buffer overflow vulnerability in RealNetworks' flagship RealPlayer software could put millions of users at risk of PC takeover, the company warned in an advisory. mark for My Articles similar articles
InternetNews
June 30, 2004
Ryan Naraine
Apache Buffer Overflow Flaw Patched A bug in popular open source server puts some users at risk of arbitrary code execution. mark for My Articles similar articles
InternetNews
September 15, 2004
Ryan Naraine
Critical Flaws Flagged in Mozilla, Thunderbird The vulnerabilities could enable malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. mark for My Articles similar articles
InternetNews
October 3, 2005
Tim Gray
Trojan Exploits Office A Trojan Horse attacking Microsoft Office has been around since April. The malicious code is disguised as a Microsoft Access file. mark for My Articles similar articles
InternetNews
May 4, 2004
Ryan Naraine
Apple Issues Patch for Mac OS X Mac OS X users are at risk of system hijack, security bypass, DoS attacks and other threats. mark for My Articles similar articles
InternetNews
September 29, 2004
Ryan Naraine
Real Plugs Media Player Holes The company released patches to protect RealPlayer users from code execution attacks. mark for My Articles similar articles
InternetNews
February 10, 2004
Ryan Naraine
Buffer Overflows Patched in Oracle 9i Database Oracle issues a fix for multiple vulnerabilities in its database server software. mark for My Articles similar articles
InternetNews
January 7, 2005
Sean Michael Kerner
New Mozilla Flaws Exposed Security firms report three new ones this week. mark for My Articles similar articles
InternetNews
February 19, 2004
Ryan Naraine
Linux Kernel Flaws Uncovered Malicious attackers could gain full super-user privileges, according to a security research firm. mark for My Articles similar articles
InternetNews
October 27, 2004
Ryan Naraine
Buffer Overflow Flaw in RealPlayer Digital media delivery firm RealNetworks has patched a potentially serious security flaw in RealPlayer and RealOne, two software products that serve as the hub of the company's streaming media business. mark for My Articles similar articles
InternetNews
September 9, 2004
Ryan Naraine
Trillian MSN Module Flaw Warning The cross-platform instant messaging client contains a boundary error vulnerability. mark for My Articles similar articles
InternetNews
December 27, 2004
Clint Boulton
Security Firms Sound Alarm on Latest Microsoft Flaws The company has yet to patch most recent Windows flaws. Symantec today warned of Phel.A, a Trojan horse that affects Windows XP SP2. mark for My Articles similar articles
InternetNews
August 16, 2005
Sean Michael Kerner
OS X Takes Hit Apple releases massive patch addressing more than 40 different vulnerabilities in OS X. mark for My Articles similar articles
InternetNews
January 31, 2005
Sean Michael Kerner
Windows XP SP2 Said at Risk From Heap Overflow A report from Positive Technologies illustrates how to bypass Windows XP SP2 heap protection to create an attack vector for a buffer overflow attack. mark for My Articles similar articles
InternetNews
December 19, 2006
Sean Michael Kerner
Mozilla Fixes Firefox Flaws, Misses One Mozilla today updated Firefox 2.0 for the first time, but the upgrade lacks at least one fix for a well known and already disclosed flaw in the open source browsers. mark for My Articles similar articles
InternetNews
March 3, 2005
Tim Gray
RealNetworks Patches Holes in The Music RealNetworks rolled out patches for a highly critical security flaw discovered in RealPlayer and other RealNetworks software... Computer Associates releases new patches. mark for My Articles similar articles
InternetNews
February 1, 2006
Sean Michael Kerner
Winamp Has a Bug The standard of the early MP3 era takes a security hit as US-CERT has issued an advisory for Winamp related to a buffer overflow vulnerability that could allow a hacker to execute arbitrary code. mark for My Articles similar articles
InternetNews
June 22, 2004
Ryan Naraine
Buffer Overflows in ISC's DHCP Users at risk of denial-of-service or code execution attacks. mark for My Articles similar articles
InternetNews
December 16, 2004
Michael Singer
Adobe Fixes Multiple Flaws Adobe issued a patch this week that helps prevent multiple flaws found in its products. mark for My Articles similar articles
InternetNews
December 1, 2004
Sean Michael Kerner
Microsoft Patches IFRAME Out of Cycle In a surprise move, Microsoft has released an out-of-cycle patch for the recently exposed IFRAME vulnerability in Internet Explorer that affects non-Windows XP SP2 users. mark for My Articles similar articles
InternetNews
December 14, 2007
Sean Michael Kerner
Apple Secures QuickTime Third update in as many months fixes a pair of media flaws and disables another. mark for My Articles similar articles
InternetNews
January 22, 2009
Sean Michael Kerner
Apple Issues Patches for QuickTime Apple issues critical update fixing at least 7 flaws that could leave both Mac and Windows users at risk. mark for My Articles similar articles
InternetNews
December 10, 2010
Sean Michael Kerner
Mozilla Patches 11 Firefox Security Flaws Open source browser vendor updates Firefox 3.6.13 to address at least 11 security vulnerabilities, including numerous threats to memory and a fix for OpenType fonts. mark for My Articles similar articles
InternetNews
August 5, 2004
Ryan Naraine
US-CERT: Critical Flaws in libpng Multiple vulnerabilities in the popular PNG reference library puts users at risk of malicious hacker attacks. mark for My Articles similar articles
InternetNews
January 18, 2007
Sean Michael Kerner
Sun Plugs Highly Critical Java Vulnerability Sun has officially announced that it has fixed a highly critical vulnerability in its Java Runtime Environment. mark for My Articles similar articles
InternetNews
April 16, 2004
Ryan Naraine
Multiple Linux Flaws Reported The more serious vulnerability could cause buffer overflows and lead to privilege escalation attacks. mark for My Articles similar articles
InternetNews
March 4, 2004
Ryan Naraine
Buffer Overflow Detected in Adobe Reader Security researchers have issued warnings for a 'high risk' vulnerability in some versions of the popular Adobe Acrobat Reader. mark for My Articles similar articles
PC Magazine
November 11, 2003
The Lookout: New Critical RPC Flaws Nearly a month to the day after the Blaster worm began tearing through the Internet, Microsoft Corp. reported three newly identified flaws in the Windows RPC protocol, two of which are quite similar to the one that Blaster attacks. mark for My Articles similar articles
InternetNews
September 8, 2004
Ryan Naraine
Apple Issues Mega Security Update The company patched more than a dozen flaws in the Jaguar and Panther versions of the Mac operating system. mark for My Articles similar articles
InternetNews
February 10, 2004
Ryan Naraine
Microsoft Patches 'Critical' ASN.1 Vulnerability Buffer overflows could give malicious hackers complete control of unpatched machines. mark for My Articles similar articles
InternetNews
May 7, 2004
Ryan Naraine
'Critical' Buffer Overflow Found in Eudora Users of the venerable e-mail client are at risk of buffer overflows. mark for My Articles similar articles
InternetNews
August 9, 2004
Ryan Naraine
Critical Bug Found in AOL's AIM A specially crafted AIM away message could put users at risk of PC takeover. mark for My Articles similar articles
Linux Journal
Daniel Lazenby
SAMBA Black Book by Dominic Baines SAMBA Black Book is about providing server message blocks (SMB) networking services in a mixed operating system network. This 13-chapter book offers the reader foundational information, advanced topics and explores administrative issues... mark for My Articles similar articles
InternetNews
December 23, 2004
Clint Boulton
Patching Oracle, IBM For The Holiday Security experts at U.K.-based Next Generation Security Software brought tidings of security vulnerabilities in Oracle and IBM software in time for the Christmas holiday. mark for My Articles similar articles
InternetNews
January 13, 2005
Sean Michael Kerner
Linux Heavies Issue Patches Linux vendors Red Hat, Novell/SUSE, Mandrakesoft, Debian and Gentoo have issued advisories and patches this week for a number of different vulnerabilities that have hit them. mark for My Articles similar articles
InternetNews
October 11, 2004
Ryan Naraine
Web Servers, BIND Top 2004 Vulnerabilities List The SANS institute breaks down the top 10 vulnerabilities in Windows and Unix systems. mark for My Articles similar articles
InternetNews
January 12, 2004
Ryan Naraine
Buffer Overflow Plugged in Sun ONE Web Server Sun releases service pack to fix denial-of-service vulnerability. mark for My Articles similar articles
InternetNews
February 13, 2008
Sean Michael Kerner
Apple Patches Flawed Leopard, Tiger US-CERT issues Technical Security Alert as Apple updates its operating systems with 11 patches. mark for My Articles similar articles
InternetNews
July 30, 2004
Ryan Naraine
Check Point Patches Buffer Overflows A buffer overflow vulnerability in Check Point's virtual private network (VPN) products could put users at risk of network takeover, the company warned in an advisory. mark for My Articles similar articles
InternetNews
March 26, 2004
Ryan Naraine
It's a (Real) Buffer Overflow Problem RealNetworks confirms a potential root exploit flaw in multiple Helix Universal Server products. mark for My Articles similar articles
InternetNews
August 10, 2010
Microsoft Chasing Another Zero-Day Flaw Just a week after releasing an out-of-bound patch for a zero-day flaw, Microsoft is at it again, chasing down a new vulnerability that allegedly targets all supported versions of Windows. mark for My Articles similar articles
InternetNews
December 18, 2007
Sean Michael Kerner
Apple Patches Tiger and Leopard Apple plugs 31 security flaws across its current OS X lineup. mark for My Articles similar articles
PC Magazine
October 1, 2003
Jim Louderback
The Lookout: Widespread Windows Hole Microsoft Corp. has revealed a gaping hole inside most Windows PCs. mark for My Articles similar articles
InternetNews
February 13, 2007
Andy Patrizio
Patch Day Yields a Dozen New Fixes From Microsoft Half of the fixes from Microsoft are non-OS related, including one embarrassing vulnerability. mark for My Articles similar articles
InternetNews
August 12, 2004
Ryan Naraine
Widcomm Bluetooth a Virus Risk A security research firm has discovered a serious vulnerability in Widcomm's widely deployed Bluetooth Connectivity Software that could lead to wireless delivery of malicious worms and viruses. mark for My Articles similar articles
Military & Aerospace Electronics
July 2005
Adam Kolawa
Reducing software security vulnerabilities through unit testing Buffer overflows are the most common type of attack to exploit military and aerospace systems, but common industry best practices -- like unit testing and coverage analysis -- can help prevent these attacks. mark for My Articles similar articles