Searching all of TechTarget| 16,347 results for "vulnerability"

vulnerability: A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential ...

See all definition search results provided by Whatis.com

SearchSecurity

By Randall Gamby Manage Jun 01, 2015

Understanding and mitigating a FREAK vulnerability attack

After the discovery that the FREAK vulnerability can affect a wide variety of OSes, enterprises should amp up mitigation efforts. Here's some background on the attack and how to stop it. Continue Reading

MicroscopeUK

By Linda Endersby May 28, 2015

Zero-day security vulnerabilities on the rise

Secunia Vulnerability Update shows cyber attacks increasing in sophistication Continue Reading

ComputerWeekly

Mar 13, 2015

Business risks of software vulnerabilities

This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses. Continue Reading

SearchCloudSecurity

By Rob Shapland Problem Solve Jun 30, 2015

Addressing the VENOM cloud vulnerability with cloud patch management

The VENOM cloud vulnerability was called the next Heartbleed, but how bad is it? Expert Rob Shapland explains the affect it should have on your enterprise. Continue Reading

ComputerWeekly

By Warwick Ashford Jun 26, 2015

Business urged to patch Cisco SSH vulnerability

The presence of a default authorised SSH key could allow an unauthenticated, remote attacker to connect to the affected system with the privileges of the root user, Cisco warns Continue Reading

SearchSecurity

By Rob Wright News Jun 24, 2015

Growing threats make security vulnerability management essential

At RSA Conference 2015, Qualys CTO Wolfgang Kandek said enterprises need to be smart about how they tackle security vulnerabilities because there are simply too many for organizations to handle. Continue Reading

SearchSecurity

By Kevin Beaver Manage Jun 19, 2015

How can the Misfortune Cookie router vulnerability be avoided?

While the Misfortune Cookie router flaw can only be fixed by hardware vendors, there are several things enterprises can do to minimize the impact of such a vulnerability. Expert Kevin Beaver explains. Continue Reading

SearchSecurity

By Michael Heller News Jun 17, 2015

Samsung vulnerability affects up to 600 million Android devices

A flaw in the default keyboard found on many Samsung Galaxy Android devices may leave as many as 600 million devices at risk for a man-in-the-middle attack. Continue Reading

SearchSecurity

By Maxim Tamarov News Jun 05, 2015

Vulnerability study questions accuracy of CVSS scores

A new study claims social media may be a useful indicator of vulnerability risk and lead to more accurate CVSS scores and prioritization. Continue Reading

SearchCloudSecurity

By Rob Shapland Manage Mar 31, 2015

How to conduct proper AWS vulnerability scanning

Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model. Continue Reading