Security News

91.1% of ICS hosts have vulnerabilities that can be exploited remotely (Help Net Security)
2016-07-12 12:45

To minimize the possibility of a cyber attack, Industrial Control Systems (ICS) are supposed to be run in a physically isolated environment. However this is not always the case. Kaspersky Lab...

Report on the Vulnerabilities Equities Process (Schneier on Security)
2016-07-11 17:15

I have written before on the vulnerabilities equities process (VEP): the system by which the US government decides whether to disclose and fix a computer vulnerability or keep it secret and use it...

Unsung cybersecurity vulnerabilities in US infrastructure and utilities (Help Net Security)
2016-07-08 13:00

This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated “legacy systems” still in use across the U.S. government....

Foxit Patches 12 Vulnerabilities in PDF Reader (Threatpost)
2016-06-30 17:52

Foxit patched a dozen vulnerabilities in its PDF reader software this week, more than half of which could be used to directly execute arbitrary code on vulnerable installations of the product.