Microsoft Security Bulletin Summary for February 2014
thirty-one individual vulnerabilities. Four Bulletins are classified as Critical and three as important. Using a vulnerability scanning tool. According to…
thirty-one individual vulnerabilities. Four Bulletins are classified as Critical and three as important. Using a vulnerability scanning tool. According to…
Adobe released critical security patch for Flash Player. The patch addresses (CVE-2014-0497) an integer underflow vulnerability that can be used…
what is a buffer? In general, the term buffer is a temporary storage, a space in the memory used to…
A new kind of botnet in cyber security has been uncovered which takes an innovative approach to find security vulnerabilities…
It took us close to nine months to translate our idea into reality. We had debated the idea (for ANCOR,…
One of the most common memory corruption errors usually found in an application is the “Double Free” error. Double-free vulnerability…
Any program intended to disrupt computer or network operation, gather sensitive information, or gain access to private computer systems or…
In firefox version 3.6 or higher, VMware Remote Console Plug-in will not load properly. To open VMWare Remote Console, there…
There is no “magic box” security. I can’t buy a device in the market that can be plugged in somewhere…
SecPod intends to publish security advisories in an XML format that conforms to Common Vulnerability Reporting Format (CVRF version 1.1).…