Invest in research on how to reduce Internet security vulnerability and computers that are part of the Internet.
Oops, researchers just unveiled a pretty serious security vulnerability in the iPhone.
ENGADGET: Safari exploit gives hackers full control over iPhones and possibly PCs and Macs
Not because it would be too difficult, says Aaron Portnoy, a researcher at the security vulnerability tracking firm Tipping Point, but because it would be too easy.
"The more functionality you have, the more likelihood there is for a security vulnerability, and Windows NT just keeps building more and more functionality in there, " Winkler said.
After months of inaction and even a warning from the Department of Homeland Security, Oracle has finally released a fix for yet another security vulnerability in its ubiquitous and notoriously buggy Java software.
FORBES: Forget Oracle's Latest Java Patch. Just Kill The Program In Your Browser For Good
Shortly thereafter, Microsoft issued a statement saying that it does not consider the results of the jailbreak to be part of a security vulnerability, and that the circumvention method may not be available for long.
FORBES: Microsoft Actually Applauds Hacker For Windows RT Jailbreak Attempt
In an interview with MSNBC, the researchers stated that they found a security vulnerability in the embedded systems of HP Laserjet printers that would allow new commands to be issued to the printer by posing as a firmware update.
FORBES: Hackers May Be Able To Access Networked Printers - And Set Them On Fire
Turns out Google wanted to take care of that security vulnerability discovered in the browser that could allow keystroke capture when users visit malicious sites, so they put a cork in the RC28 delivery for a minute or two while they cooked up 29 to take its place.
ENGADGET: A tale of three firmwares: comparing the T-Mobile G1's RC19, 28, and 29 builds
But White Lodging, the Hyatt franchisee that manages the Houston hotel, believes that the rooms were opened using a device that takes advantage of a glaring security vulnerability in keycard locks built by the lock company Onity, specifically a model of lock that appears in at least four million hotel rooms worldwide.
FORBES: Security Flaw In Common Keycard Locks Exploited In String Of Hotel Room Break-Ins
But it disabled cash machines and disrupted commerce in this tech-savvy, Internet-dependent country, renewing questions about South Korea's Internet security and vulnerability to hackers.
For example, the funding agencies of the Belmont Forum have established joint calls that will bring together new international partnerships of social and natural scientists working on specific themes, such as freshwater security and coastal vulnerability.
Water is the common thread that links together much of what you addressed: poverty reduction, food security, and reducing vulnerability to disasters.
Democrats are hopeless regarding taxes--which, next to national security, is a major vulnerability.
Oracle, which acquired Java when it bought Sun Microsystems in 2010, has not yet issued a security patch for this particular vulnerability.
FORBES: US Department of Homeland Security Calls On Computer Users To Disable Java
Researchers at Independent Security Evaluators have used the vulnerability to take malicious control of the iPhone from rogue websites loaded with the exploit.
ENGADGET: Safari exploit gives hackers full control over iPhones and possibly PCs and Macs
For the millions of us who fly regularly, these sorts of incidents, and the prospect of would-be terrorists testing the vulnerability of airplane security, brings up the questions of when passengers should intervene, and what they should do.
They suggest using Microsoft Baseline Security Analyzer (MBSA) for vulnerability scanning but of course there are many options from free to expensive.
FORBES: Vulnerability Intelligence Versus Vulnerability Management
Earlier this week a new and very serious vulnerability was discovered by security researchers in the Java platform that is installed into millions computers worldwide.
To demonstrate the vulnerability, the Department of Homeland Security and Idaho National Laboratory in Idaho Falls recently showed reporters a cyberattack on a mock-up of a chemical facility.
Researcher Craig Heffner presented a paper at the Black Hat security conference in Las Vegas that exposed another vulnerability in millions of routers that would allow hackers to hijack a user's Web surfing.
"Microsoft is investigating new public reports of a possible vulnerability in Windows, " said a security advisory on its website.
It takes an enormous amount of security, courage, and self respect to show vulnerability, to share credit, and to transcend envy and jealousy.
Microsoft made such a call earlier this year, after researchers at Core Security informed the company that they had found a vulnerability in the Microsoft Virtual PC software.
To really make a ground-breaking shift in mobile app security someone should open an app store that requires apps to run through a suite of security checks including code audits, fuzz testing and vulnerability assessments.
He is a senior vulnerability specialist and leads a team that discovers security and design flaws in hardware.
When Internet providers fix the vulnerability, OpenDNS will lose some of its security appeal and return to pitching itself as a quick and cheap Web filter.
Despite the fact that every security framework from Cobit to ITIL to ISO calls for vulnerability scanning, and PCI DSS requires it, most organizations are still doing it on an ad-hoc basis, if at all.
FORBES: Vulnerability Intelligence Versus Vulnerability Management
However, Douglas Wylie, Business Development Manager for Networks and Security at Rockwell Automation said in-house research found the vulnerability to be more pervasive within the Rockwell family of software.
The vulnerability was highlighted by Ravi Borgaonkar at the Ekoparty security conference, and makes use of USSD codes that are normally used by handsets to communicate with the carriers.
For all the very real advantages of a smart grid, however, its number one vulnerability has still not been adequately addressed: cyber-security.
FORBES: FERC Chair Wellinghoff on Why a 'Smart Grid' is Stupid About Cyber-Security
应用推荐