A new report using data from the National Institute of Standards and Technology’s National Vulnerability Database has looked at the top tech products of the last 20 years and discovered which had the ...
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have released a critical alert urging software developers to focus on removing weaknesses that allow unauthorized users to run ...
Android is generally considered a fairly secure operating system, but it seems vulnerabilities of varying sizes crop up all too often. Now, a report is claiming that Android had the most security ...
The Microsoft vulnerability could result in gained system privileges, while the Cisco vulnerabilities could lead to a DoS attack. The U.S. Cybersecurity and Infrastructure Security Agency has put out ...
Microsoft responded to a report published last week by London-based security intelligence firm Mi2g Ltd. that claimed the Apple Macintosh operating system (OS) and certain varieties of Unix are less ...
For the February vulnerability scorecard, I’ve added one additional platform, Novell’s SuSE Linux Enterprise Desktop 10 (SLED10). As I did for the other Linux distributions, I take the default SLED10 ...
Today, cybersecurity company Palo Alto Networks warned customers to restrict access to their next-generation firewalls because of a potential remote code execution vulnerability in the PAN-OS ...
Microsoft Corp. is responding to a report published last week by London-based security intelligence firm mi2g Ltd. that claimed the Apple Macintosh operating system and certain varieties of Unix are ...
For the April vulnerability scorecard, we’re back to having four charts again, 2 each for server and workstation products. Note that each of the Linux distributions analyzed do not include the full ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results