Vulnerabilities

6K

Solutions

64

Articles & Videos

7K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Refine results

I have a Kaseya deployment that is failing a PCI vulnerability scan and the recommended remediation doesn't seem to fix the result. The "Microsoft IIS ISAPI Extension Enumerate Root Web Server …

16 views
Netscaler Common Configuration How To guides
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Doxware

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.

040 views

I am looking for someone who has used https://www.eventsentry.com/blog/2016/03/defeating-ransomware-with-eventsentry-auditing.html to protect against ransomware and their experience with it - pros and…

217 views

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network components" (Curry et al., 2011).

062 views

Is there a tool that can take a URL, scan the page, and identify dead links?

If a Chrome extension exists, that's a plus.

955 views

i am looking to purchase a software that protects my machine win 10 from any attack , malware, virus , trojans etc

what is the best one based on your experience?  when i say best, i mean so that it…

867 views

Here is the link that was clicked: …

120 views

My Os is win 10 pro 64 bit.  I had earlier on login problems where I was not able to login with my usual password into my pc and since the login user was my email, I had to use a laptop to get into …

343 views

Good evening experts,

my internet explorer options proxy server sectioning keep being checked by some program or perhaps a malware virus my virus scan is not picking up. I use Comcast's free …

1138 views

Please see the findings below from a recent review.  

can you please let me know :

•      Will the upgrade to Exchange 2013 resolve the vulnerability below?
•      Do we have any viable options with 2007…

879 views
ScreenConnect 6.0 Free Trial
ScreenConnect 6.0 Free Trial

Explore all the enhancements in one game-changing release, ScreenConnect 6.0, based on partner feedback. New features include a redesigned UI, app configurations and chat acknowledgement to improve customer engagement!

Hi Guys

What components of PC can get a virus?
Or how to scan motherboard or Ram ?

Thank you

665 views

Hi guys

I have noticed today on my weekly Firewall report botnet initiator. It is one connection from yestarday please see below



Could you help me what shuld I do ? is it false positive ? …

21115 views

Hi Guys,
I have an Internet Information Services web server, and it was attacked by ransomware.
Honestly I don't even know how can the hacker actually infect the server just by using the port 80.

12199 views

Hi Experts,

App Control is not blocking access to Google Play app store from smartphones, however, play.google.com is blocked from browsers on all PCs. How do I block it for smartphones?

453 views

Hello,
       We have recently seen many entries in our Sonicwall log that states"Possible RST Flood on IF X0" and then extends to the ip of the source. The internal ip is coming from our Barracuda …

6593 views

Please advice on utilities, preferably free, that we can use in an iPhone or in our notebook where it would detect if a WiFi is unsecured.

14125 views

I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that Anti-Virus applications occasionally miss.

1146 views

We are going to start installing an SOC vendor's EVM which collects security / IPS / firewall
events to be sent to the SOC vendor.

Q1:
Is is a practice to do VA scan against these EVMs in case …

593 views

Many FX traders & dealers in banks use Reuters Messenger & others to get quotes & market info :
understand these laptops are not on dedicated/isolated networks but connect to the banks'
corporate …

2114 views
Best Practices: Disaster Recovery Testing
Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

What can we do to prevent a ransoneware infection, any apps we can installed?

33128 views

These 2 items show up on my vulnerability scan of my HP Laser Jet p3015

Can someone please explain them to me  and if they can be shut off

770 views

Hello to all of you.
Next week I'm going to perform a vulnerability assesment (NO penetration test).
The scope of the assesment is to check the security status of 30 windows clients PC running …

3105 views

Have a drive locked that the files are inaccessible.  Our tech indicated probable RW attack.  Please adive.  Thank you in advance.

9119 views

Site name:  livehosting.ro
Noob question:this site is sql vulns?
what to do?any tutorial?


2102 views

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.

0499 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Security
    (23,368)
  2. Anti-Virus Apps
    (22,173)
  3. OS Security
    (21,511)
  4. Anti-Spyware
    (5,406)
  5. Network Security
    (6,290)
  6. Windows XP
    (118,278)
  7. Software Firewalls
    (19,719)
  8. Encryption
    (6,930)
  9. Windows Server 2003
    (128,563)
  10. Web Browsers
    (39,200)