Vulnerabilities

6K

Solutions

65

Articles & Videos

7K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Related Topics

  1. Security
  2. Anti-Virus Apps
  3. OS Security
  4. Anti-Spyware
  5. Network Security
  6. Windows XP
  7. Software Firewalls
  8. Encryption
  9. Windows Server 2003
  10. Web Browsers
Refine results

We noticed in a hotel we stood at that, the iPhone wifi setting after connecting to the hotels wifi has a warning of "Security  Recommendation" (see below).  



It seems it's a open network since…

1868 views
Industry Leaders: We Want Your Opinion!
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where

0173 views

We run our McAfee Vulnerability Mgr scan against a Windows 2012 R2 & the report
indicated it's a Win 2016 (which I don't know why the wrong OS is given) & it gives 3
vulnerabilities below (which my …

349 views

There has been patches that were missed & lapses in patching timely for non-Windows
platforms.   I noticed, Wintel was quite up to the mark on patching & I reckon this is
due patch management …

1163 views

There's growing concern on the timeliness & thoroughness of patching.  I need to
broadcast out an email to the organization's hundreds of IT staff (infra & apps teams)
to emphasize this in a firm …

652 views

Hi all,

I am sure that some people have been dealing with this recent security issue regarding disabling SMBv1.

Further details here:

5345 views

Can anyone recommend the best honey pots esp those that are effective against
APTs & ransomwares?

We are looking at https://canary.tools  : any reviews on this company's honeypot?

753 views

The user self-service tools of SAP HANA contain some vulnerabilities and in order to prevent it , we have to update the systems or desactivate the the self-service tool.

In order to to determine …

262 views

Hello to everyone,
this question might be easy for most of you but I would like to be notified by email  on every critical Vendor's vulnerabilities found.
Actually I go and check once a week on …

366 views

Understand  EPO & NIDS can't add SHA256 hashes but we wud still want to mitigate against them.

how can we go about doing this?  So far our EPO could block/prevent creation of certain file

850 views
Technology Partners: We Want Your Opinion!
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Hi, we have various power-point files sent to us and wanted to know if there is no malicious code (maybe like VBA) within them.  We have run anti-virus and anti-spam and all ok.  Any other thing we …

12112 views

From what I've heard, SHA-1 is no longer the standard because there were vulnerabilities found.  Which SHA would you suggest?

How long should the cert last for?  Expiration?  5 years?

Naren

258 views

We have got this below code at our lotus notes webpage. which pop out alert on window.

https://abc.com/xyz.nsf/form.html?open&page=authentication&msg=invalidcredentials">
<svg/onload=alert(/BUG …

951 views

I have a Kaseya deployment that is failing a PCI vulnerability scan and the recommended remediation doesn't seem to fix the result. The "Microsoft IIS ISAPI Extension Enumerate Root Web Server …

169 views
Doxware

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.

0213 views

I am looking for someone who has used https://www.eventsentry.com/blog/2016/03/defeating-ransomware-with-eventsentry-auditing.html to protect against ransomware and their experience with it - pros and…

247 views

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network components" (Curry et al., 2011).

0188 views

Is there a tool that can take a URL, scan the page, and identify dead links?

If a Chrome extension exists, that's a plus.

999 views

i am looking to purchase a software that protects my machine win 10 from any attack , malware, virus , trojans etc

what is the best one based on your experience?  when i say best, i mean so that it…

8117 views
Independent Software Vendors: We Want Your Opinion
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Here is the link that was clicked: …

153 views

My Os is win 10 pro 64 bit.  I had earlier on login problems where I was not able to login with my usual password into my pc and since the login user was my email, I had to use a laptop to get into …

384 views

Good evening experts,

my internet explorer options proxy server sectioning keep being checked by some program or perhaps a malware virus my virus scan is not picking up. I use Comcast's free …

1176 views

Please see the findings below from a recent review.  

can you please let me know :

•      Will the upgrade to Exchange 2013 resolve the vulnerability below?
•      Do we have any viable options with 2007…

8125 views

Hi Guys

What components of PC can get a virus?
Or how to scan motherboard or Ram ?

Thank you

6108 views

Hi guys

I have noticed today on my weekly Firewall report botnet initiator. It is one connection from yestarday please see below



Could you help me what shuld I do ? is it false positive ? …

21149 views
Show more content
201506-LO-Top-001

Vulnerabilities

6K

Solutions

65

Articles & Videos

7K

Contributors

A vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness, known as the attack surface. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. Other vulnerabilities include security risks, security defects and constructs in programming languages that are difficult to use properly.

Related Topics

  1. Security
  2. Anti-Virus Apps
  3. OS Security
  4. Anti-Spyware
  5. Network Security
  6. Windows XP