Security News
Tired: SQLi. Expired: Format string exploits. Hired: Anyone who can port code from C/C++ On Tuesday, the Common Weakness Enumeration (CWE) team from MITRE, a non-profit focused on information...
A newly released analysis tool from Microsoft helps security engineers and developers investigate memory corruption bugs. read more
At the Security Analyst Summit, Mark Dowd described how memory corruption mitigations are successfully driving up exploit development costs.
Obihai Technology recently patched a slew of issues in its ObiPhone IP phone products that could have led to memory corruption, a buffer overflow, and denial of service conditions, among other outcomes.
Several vulnerabilities were fixed this week in the file archiver 7-Zip which could have led to arbitrary code execution and file corruption.
40 percent of all compliance officers surveyed believe their company’s bribery and corruption risks will increase in 2016, according to a new report by Kroll and the Ethisphere Institute. One in...
Adobe updated its Shockwave Player, patching a critical memory corruption vulnerability in the software.