Vulnerabilities

6K

Solutions

61

Articles & Videos

7K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Refine results

What can we do to prevent a ransoneware infection, any apps we can installed?

3367 views
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

These 2 items show up on my vulnerability scan of my HP Laser Jet p3015

Can someone please explain them to me  and if they can be shut off

721 views

Hello to all of you.
Next week I'm going to perform a vulnerability assesment (NO penetration test).
The scope of the assesment is to check the security status of 30 windows clients PC running windo…

342 views

Have a drive locked that the files are inaccessible.  Our tech indicated probable RW attack.  Please adive.  Thank you in advance.

954 views

Site name:  livehosting.ro
Noob question:this site is sql vulns?
what to do?any tutorial?


240 views

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.

0184 views

Q1
As governance/compliance person, I'm often not being updated by network teams when
new VLANs / subnets are being created.  Network diagram may not be updated timely too.
What are the surest ways…

532 views

We have a finding from an external PT scan tt one website (IIS 7.0) has
directory browsing enabled & a few folders were listable.

Now that we've applied the fix below, I need a safe & easy way to…

335 views

I'm running a vulnerability scanner on my network and am realizing just how many things are running self signed certs.  Things such as internally face web apps, laser printers, switches, etc.  I reall…

354 views

Hi to all of you,
I've been asked to write guidelines on how to perform Penetration Testin over mobile devices.

Can you please provide me some help , in particular based on your experience the met…

263 views
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

It seems to me XSS attacks insert malicious scripts/elements/links into the server side output before it is rendered by the browser.  From what I understand the user opens the page and the embedded ex…

548 views

What's the best practice out there?  Only scan server zones ie
DMZ, App server (internal) zone & DB zone?

What about servers' Management zone & PCs/users zones?

Can I say the reasons PCs /user…

451 views

We have an app from EMC (the storage vendor) that requires us to use IE8 :
log a case & was told IE10-11 not supported as screen gets garbled.

As this server is internal (ie not accessible via Int…

1463 views

1. I have looked at QUALYS and secureState's products.  I know that there are many products out there.   Any recommendations?
2. We will ultimately have to do a pen test are there any recommendations…

1669 views

We are asking EE what is their experience in web sites that does online scanning of apps that may be infected by spyware, viruses or malware.  

We have used VirusTotal but wanted to know how reliab…

455 views

We have to do compliance scanning now going forward every quarter and w do have 3 users that have the juniper vpn  installed on their local computer.  This is causing us to fail along with the followi…

749 views

We have installed in our computer, a Windows 10 Pro OS, Spybot-Search & Destroy, Malwarebytes, Comodo Internet Security (which has Anti-Virus) and SUPERAntiSpyware.  Afer installing them, all are in m…

335 views

We have ran a series of apps for vulnerability in one our computers.  We ran:

Malwarebytes Anti-Malware

Spybot-S&D Start Center

SUPERAntiSpyware Free Edition

COMODO Internet Security


Only…

349 views

If you're not part of the solution, you're part of the problem.  

Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual traffic patterns.

0118 views
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Both of CDN providers (one of them is Akamai) that offers DDoS protection service told
me they don't offer DDoS drills where we simulate an attack situation & started calling
out relevant parties.…

352 views

We found in our Uninstall list of apps "host app service" from pokki.  After googling and finding lots of info, we have hard time to decide if,

- is this is safe apps?
- is it necessary to have it…

1143 views

We have hundreds of public facing web pages : do we protect all of them or only those

a) that when defaced will cause our corporate image to be affected?
b) or web pages that have injection & cert…

759 views

Guys,

I have removed all remnants of the virus that caused this pop up. However they is something still on the pc that will randomly cause this message to be displayed. I have searched all over go…

748 views

Hi People,

I'm trying to find the usage of a particular DOMAIN\Service-Account usage in my whole AD domain.

Can anyone here please share which Security Event ID should I be looking / monitor or …

389 views

Dear Experts.

I have a friend who has outdated software on his web-server.
How can I prove to him that the server is vulnerable to attack?

My plan is to go to known vulnerability databases and …

575 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Security
    (22,909)
  2. Anti-Virus Apps
    (22,106)
  3. OS Security
    (21,442)
  4. Anti-Spyware
    (5,388)
  5. Network Security
    (6,140)
  6. Windows XP
    (118,248)
  7. Software Firewalls
    (19,711)
  8. Encryption
    (6,857)
  9. Windows Server 2003
    (128,503)
  10. Web Browsers
    (39,057)