Searching all of TechTarget| 18,671 results for "vulnerability"

vulnerability: A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential ...

See all definition search results provided by


By Ed Moyle Evaluate Sep 07, 2016

Why the DROWN vulnerability requires constant vigilance

The DROWN vulnerability affected hundreds of SaaS applications, and they're not all completely fixed yet. Expert Ed Moyle discusses the SSLv2 vulnerability and how to manage it. Continue Reading


By Nick Lewis Evaluate Jun 17, 2016

Why wasn't the Java serialization vulnerability patched?

An old Java serialization vulnerability has popped up again in PayPal's servers. Expert Nick Lewis explains how this vulnerability works and why it had not been patched. Continue Reading


By Judith Myerson Get Started Aug 10, 2016

Putting IPv6 vulnerabilities under the microscope

Examining IPv6 vulnerabilities prior to deployment is crucial for enterprises. Expert Judith Myerson explains the risks of older gear, unpatched IPv6 ND flaws and other issues. Continue Reading


By Tayla Holman News Aug 05, 2016

MHealth apps too complicated for vulnerable populations

There's no denying that mHealth apps have the potential to help patients better manage their health. But according to a recent study conducted by researchers from the University of California, San ... Continue Reading


By Peter Loshin News Sep 20, 2016

Shadow Brokers' Cisco vulnerability exploited in the wild

Cisco warns that an as-yet unpatched vulnerability derived from Shadow Brokers' BENIGNCERTAIN hacking tool is being exploited in the wild. Continue Reading


By Peter Loshin News Sep 15, 2016

MySQL vulnerability disclosed, status of patches uncertain

Oracle's lack of response to security researchers raises more questions after a zero-day MySQL vulnerability was reported, though patches may have already been released. Continue Reading


By Kevin Beaver Manage Sep 14, 2016

Juggling Windows Server vulnerability scans and patching

Regular Windows Server vulnerability scans can close any gaps in IT's security perimeter, when paired with a regimented patching process Continue Reading


By Nick Lewis Get Started Jun 28, 2016

The problem with Badlock and branded vulnerability marketing

Branded vulnerability marketing, such as in the case of Badlock, can raise challenges for responsible disclosure. Expert Nick Lewis explains the problems it creates. Continue Reading


By Michael Cobb Problem Solve Mar 25, 2016

How to tell a security backdoor from a vulnerability

Security backdoors and security vulnerabilities can often be confused with one another. Expert Michael Cobb offers guidance on distinguishing the two. Continue Reading


By Warwick Ashford Aug 08, 2016

900 million Android devices vulnerable to attackers

Enterprises and individuals need to install security updates for all devices with vulnerable Qualcomm chip drivers if they want to ensure attackers can‘t take control of them, warns Check Point Continue Reading