Searching all of TechTarget| 15,521 results for "vulnerability"

vulnerability: A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential ...

See all definition search results provided by


Mar 13, 2015

Business risks of software vulnerabilities

This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses. Continue Reading


By Rob Shapland Manage Mar 31, 2015

How to conduct proper AWS vulnerability scanning

Vulnerability management in the cloud can be complicated. Expert Rob Shapland explains how to perform vulnerability scans in AWS under the shared responsibility model. Continue Reading


By Warwick Ashford Mar 11, 2015

Apple and Microsoft patch Freak vulnerability

Apple and Microsoft have joined Google in releasing security updates for the the so-called Freak security vulnerability Continue Reading


By Michael Heller News Mar 25, 2015

Secunia: Better vulnerability reporting doesn't mean more patches

Secunia's 2015 Vulnerability Report shows that better vulnerability reporting and awareness of flaws doesn't necessarily mean vendors offer more patches or focus on the most critical issues. Continue Reading


By Nick Lewis Evaluate Nov 18, 2014

How vulnerable is Silverlight security?

Microsoft Silverlight has been in the spotlight due to an increase in the number of exploit kits it is included in. Expert Nick Lewis explains the threat's severity and how to mitigate it. Continue Reading


By Michael Heller News Mar 13, 2015

Does Rowhammer mark a new wave of hardware vulnerabilities?

Experts agree that the Rowhammer vulnerability likely isn't an immediate threat to enterprises, but disagree on whether hardware vulnerabilities are about to reach a tipping point. Continue Reading


By Warwick Ashford Mar 06, 2015

Windows vulnerable to Freak attacks, says Microsoft

Microsoft says all supported versions of its Windows operating system are vulnerable to attacks exploiting the Freak security vulnerability Continue Reading


By Michael Heller News Mar 05, 2015

Microsoft confirms Windows vulnerable to FREAK attack

The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows. Continue Reading


By Peter Wood Mar 02, 2015

How to use red teaming to find real-world vulnerabilities

Red teaming simulates a cyber criminal attack under controlled conditions to identify risks and the impact on the business Continue Reading


By Brad Casey Get Started Nov 27, 2014

Vulnerability scanner tools in the data center

If you're wondering whether to use a software- or hardware-based network vulnerability scanner, take a look at your budget and network deployment. Continue Reading