Searching all of TechTarget| 16,090 results for "vulnerability"

vulnerability: A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential ...

See all definition search results provided by Whatis.com

ComputerWeekly

Mar 13, 2015

Business risks of software vulnerabilities

This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses. Continue Reading

SearchCloudSecurity

By Rob Shapland Manage Mar 31, 2015

How to conduct proper AWS vulnerability scanning

Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model. Continue Reading

ComputerWeekly

By Warwick Ashford Mar 11, 2015

Apple and Microsoft patch Freak vulnerability

Apple and Microsoft have joined Google in releasing security updates for the the so-called Freak security vulnerability Continue Reading

SearchSecurity

By Michael Heller News Apr 14, 2015

'Redirect to SMB' vulnerability affects all versions of Windows

The new 'Redirect to SMB' vulnerability is an update to an 18-year-old flaw that can lead to man-in-the-middle attacks on all versions of Windows. Continue Reading

SearchSecurity

By Michael Heller News Apr 13, 2015

Cybersecurity risks masked by controversial vulnerability counts

Experts have split opinions regarding the correct methodology for counting vulnerabilities, but all agree that focusing on numbers can mask real cybersecurity risks. Continue Reading

SearchSecurity

By Nick Lewis Evaluate Nov 18, 2014

How vulnerable is Silverlight security?

Microsoft Silverlight has been in the spotlight due to an increase in the number of exploit kits it is included in. Expert Nick Lewis explains the threat's severity and how to mitigate it. Continue Reading

SearchSecurity

By Michael Heller News Mar 25, 2015

Secunia: Better vulnerability reporting doesn't mean more patches

Secunia's 2015 Vulnerability Report shows that better vulnerability reporting and awareness of flaws doesn't necessarily mean vendors offer more patches or focus on the most critical issues. Continue Reading

SearchSecurity

By Michael Heller News Mar 13, 2015

Does Rowhammer mark a new wave of hardware vulnerabilities?

Experts agree that the Rowhammer vulnerability likely isn't an immediate threat to enterprises, but disagree on whether hardware vulnerabilities are about to reach a tipping point. Continue Reading

ComputerWeekly

By Warwick Ashford Mar 06, 2015

Windows vulnerable to Freak attacks, says Microsoft

Microsoft says all supported versions of its Windows operating system are vulnerable to attacks exploiting the Freak security vulnerability Continue Reading

SearchSecurity

By Michael Heller News Mar 05, 2015

Microsoft confirms Windows vulnerable to FREAK attack

The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows. Continue Reading