Searching all of TechTarget| 18,767 results for "vulnerability"

vulnerability: A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential ...

See all definition search results provided by


By Joseph Granneman Manage Oct 13, 2016

How to use hashcat to address authentication vulnerabilities

Authentication vulnerabilities are a constant problem, but testing tools like hashcat can make a significant difference. Expert Joe Granneman discusses hashcat and password cracking. Continue Reading


By Nick Lewis Evaluate Oct 10, 2016

SAP vulnerability: Why didn't the patch work correctly?

An old SAP vulnerability that enabled remote administrative access was found to be ineffectually patched. Expert Nick Lewis explains how enterprises can secure their systems. Continue Reading


By Rob Wright Evaluate Sep 29, 2016

Risk & Repeat: More Symantec vulnerabilities emerge

In this Risk & Repeat podcast, SearchSecurity editors discuss the latest Symantec vulnerabilities reported by Google Project Zero and the Shadow Brokers' Cisco exploit. Continue Reading


By Ed Moyle Evaluate Sep 07, 2016

Why the DROWN vulnerability requires constant vigilance

The DROWN vulnerability affected hundreds of SaaS applications, and they're not all completely fixed yet. Expert Ed Moyle discusses the SSLv2 vulnerability and how to manage it. Continue Reading


By Ed Tittel Evaluate Oct 20, 2016

Beyond Security's AVDS: Vulnerability management product overview

Expert Ed Tittel examines Beyond Security's Automated Vulnerability Detection System, which scans IP-based network infrastructures to detect vulnerabilities and identify assets. Continue Reading


By Peter Loshin News Oct 19, 2016

IBM yanks POC code in coordinated vulnerability disclosure

IBM asks, and researcher pulls proof of concept code from a coordinated vulnerability disclosure, internet explodes. Continue Reading


By Nick Lewis Evaluate Jun 17, 2016

Why wasn't the Java serialization vulnerability patched?

An old Java serialization vulnerability has popped up again in PayPal's servers. Expert Nick Lewis explains how this vulnerability works and why it had not been patched. Continue Reading


By Warwick Ashford Oct 18, 2016

Most businesses vulnerable to cyber attacks through firmware, study shows

Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed Continue Reading


By Peter Loshin News Oct 14, 2016

Adobe patches 83 vulnerabilities in latest crop of fixes

News roundup: As Adobe patches 83 vulnerabilities in Flash Player, Acrobat and Reader, the good news is none have been exploited in the wild -- yet. Plus, IoT threats and more. Continue Reading


By Judith Myerson Get Started Aug 10, 2016

Putting IPv6 vulnerabilities under the microscope

Examining IPv6 vulnerabilities prior to deployment is crucial for enterprises. Expert Judith Myerson explains the risks of older gear, unpatched IPv6 ND flaws and other issues. Continue Reading