Two proof-of-concept bugs were identified in Google's new Chrome Web browser, which uses WebKit open source code.
Microsoft plans to address remote code execution vulnerabilities in next Tuesday's security patch.
An update to Microsoft's enterprise client protection app is now available.
Although the overall number of vulnerabilities being discovered in software appears to be leveling off or even dropping, two recent reports on Web security say that the overwhelming majority of Web sites studied still have unpatched vulnerabilities that could expose visitors to malicious code.
The writing's on the wall, it seems, for purveyors of security point solutions. Gone is the day of the best-of-breed anti-virus, firewall, e-mail security or encryption vendors. These days, it's a security suite play.
Check Point Software updated its Web security software suite.
A critical advisory was issued after hackers tampered with the open source Linux company's Web site.
UrlScan 3.0, a security add-on to Microsoft's IIS Web server, is now available in its Release-to-Web version.
A study describes best practices for keeping down security costs and woes.
The new tool is designed to help managers assess code quality before it's shipped.
Simplifying identity with Microsoft's 'Zermatt' class libraries.
Updates to the company's ESX 3.5 and ESXi 3.5 virtualization products caused licenses to expire, and other problems.
Microsoft issued a fix yesterday via Microsoft Update for a patch blocking problem that affected System Center users.
MessageLabs reports that the number of SQL injection attacks spiked sharply last month.
Remote code execution and information disclosure risk are the main problems addressed with this patch cycle.
One fun thing about the interactive world of Web 2.0 is the online applications you can take advantage of, such as Google Gadgets.
Microsoft's Patch Tuesday security rollout next week will be expected to have 12 total fixes, with seven deemed "critical."
We dodged a bullet last month -- the discovery of a fundamental flaw in the Domain Name System, Dan Kaminsky told a standing-room only (and some sitting on the floor) crowd at the Black Hat Briefings Wednesday.
A cache of stolen data gathered from a botnet that has been quietly sweeping up information for years contained the user names and passwords for 8,485 bank accounts.
The Black Hat Briefings return to Caesars Palace this week with a new batch of hands-on security research for a crowd of 4,000 IT administrators, hackers, industry experts and government officials.