Vulnerabilities

6K

Solutions

59

Articles & Videos

7K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Refine results

We have hundreds of public facing web pages : do we protect all of them or only those

a) that when defaced will cause our corporate image to be affected?
b) or web pages that have injection & cert…

714 views
Looking for New Ways to Advertise?

Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.

Guys,

I have removed all remnants of the virus that caused this pop up. However they is something still on the pc that will randomly cause this message to be displayed. I have searched all over go…

714 views

Hi People,

I'm trying to find the usage of a particular DOMAIN\Service-Account usage in my whole AD domain.

Can anyone here please share which Security Event ID should I be looking / monitor or …

321 views

Dear Experts.

I have a friend who has outdated software on his web-server.
How can I prove to him that the server is vulnerable to attack?

My plan is to go to known vulnerability databases and …

519 views

https://www.gobear.com.sg/
https://get.com/sg/credit-cards/
http://www.moneysmart.sg/credit-cards
https://www.singsaver.com.sg/credit-card/best-deals

Q1:
Any security risks comments on the abov…

461 views

We had a client notebook stolen and they never place s password to open the notebook and their emails are with password saved that means that browser open, emails available.  We heard that there is a …

926 views

We were informed that the apps Rpcapd.exe in our Windows 10 should be disabled from msconfig.  In msconfig services tab, it's description is "Remote Packet Capture Protocol v.0 (experimental)" from th…

526 views

hello,

is anyone familiar with this tool: 'Kaspersky Anti-Ransomware Tool for Business'.
what is your opinion on it ?
is it free ?

thank u

1034 views

I am browsing a site I have developed.  www.fobgfc.org

The problem comes when refreshing the page. At the bottom I see "waiting for www.fobgfc.org..." as expected. Then "www.fobgfc.org" is replaced…

2126 views

I'm trying to sieve out which of the signatures / malwares in F-Secure is ransomware.
Anyone can get me a list?

531 views
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Hi, I have a client who has been done over with dma locker 3 and also had there only backup , which was on a local nas.
I had twice tried selling them cloud backup and Dr.

At the moment, there onl…

732 views

Greetings,

Recently I received a text from a person I recognized but who was not in my contacts.  Despite the fact they were not in my contacts, their full name was in the body of the text along wi…

1547 views

My OS is win 10 pro 64 bit and I seem to have a malware or virus of sort that displays an AD, Ad by Stack Player, and it sometimes plays a video or music.  I have run malware and also Avast programs, …

639 views

Hi

We have a mobile client,. When launched, the mobile client requires authentication to our internal auth system, which basically happens via https. The client goes to https://login,mydomain.com

131 views

Hello

We have a mobile application that we'd like to security test.... The app runs on iOS and android

I understand there are static tests, dynamics tests, manual tests and so on. Does anyone ha…

334 views
Sacm-Alert

This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.

076 views

On an airport fake "free wifi" network, would you be safe if using VPN?

Two hazards come to mind:

1) The initial login page could be malicious to take advantage of any drive-by boobie-traps.  Fo…

834 views
Ransomware

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.

184 views

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY.
How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...

0339 views
Course: Foundations of Front-End Development

Jump-start a lucrative career in front-end web development, with zero previous coding experience required. This course covers the basic programming concepts and languages required for creating engaging websites from scratch.

Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you should read this article.

0112 views

Dear Experts,

I received an unusual email notifying me as the winner of something. As you can see in the image below, that the email was sent by IAWP.org from Stephanie but the sender name is "Goog…

328 views

I used to download PDF & html pages & have several cases where there's
Adobe exploits & HTML infected pages.

If I'm browsing the Internet on a Linux desktop & do copy of the html or
PDF pages & t…

641 views

We noticed something strange.  We have a cell phone with its own LTE Internet and the office with cable internet; both from the same provider.  When out of the office, obviously the cell uses its LTE …

518 views

http://www.technipages.com/prevent-users-from-running-certain-programs.html

Above url gives a method to lock/prevent certain programs from running.  What
I need to permit only a list of programs, …

231 views

In relation the Apple iOS vulnerability that cause Apple to release 9.3.5 I had some questions I'm hoping a security person could answer

1. There are actually 3 vulnerabilities : is there a common…

551 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Anti-Virus Apps
    (22,039)
  2. Security
    (22,635)
  3. OS Security
    (21,408)
  4. Anti-Spyware
    (5,370)
  5. Network Security
    (6,053)
  6. Windows XP
    (118,206)
  7. Software Firewalls
    (19,675)
  8. Encryption
    (6,814)
  9. Windows Server 2003
    (128,402)
  10. Web Browsers
    (38,948)