Home vulnerability
 

Keywords :   


Tag: vulnerability

Alternative fixes released for Android 'master key' vulnerability

2013-07-17 13:53:38| InfoWorld: Top News

More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system. Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and vendor Duo Security, released software on Tuesday that detects if an Android device is vulnerable and applies a patch.

Tags: key alternative master released

 

Proof-of-concept exploit available for Android vulnerability

2013-07-09 17:18:20| InfoWorld: Top News

Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.

Tags: exploit vulnerability android proofofconcept

 
 

Canadian Cities' Vulnerability to Climate Change Clear After Alberta Floods

2013-07-06 15:59:00| Climate Ark Climate Change & Global Warming Newsfeed

Energy Collective: Flooding swept over Southern Alberta, Canada from Calgary to Canmore in mid-June. Evacuation orders were issued in towns and cities as rivers like the Bow and the Elbow swelled and spilled over their banks. Historic water levels were reached in Medicine Hat, downtown Calgary was emptied and underwater, and towns like High River were completely evacuated for days as police patrolled the flood ravaged streets. The Alberta flooding is one of the many climate change impacts already being felt around...

Tags: change clear cities canadian

 

Android vulnerability allows attackers to turn apps into Trojans without breaking their signatures

2013-07-03 20:05:32| InfoWorld: Top News

A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS. Researchers from San Francisco mobile security startup firm Bluebox Security found the flaw and plan to present it in greater detail at the Black Hat USA security conference in Las Vegas later this month.

Tags: their turn breaking signatures

 

QinetiQ Supports UK Royal Navy in the Development of a Vulnerability Reduction Policy

2013-06-14 18:04:00| Naval Technology

The Vulnerability Reduction and Shock Engineering Team is part of the Naval Authority Group within the Defence, Equipment and Support (DE&S) of the UK Ministry of Defence (MOD).

Tags: policy development supports reduction

 

Sites : [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] next »