News tagged with vulnerability

Related topics:

EU extends ban on deep-sea shark fishing

EU nations on Monday extended their ban on deep-sea shark fishing for the European fleet for at least another two years, with only Spain and Portugal voting against.

Nov 11, 2014
4 / 5 (1) 0

NIST: Samsung Find My Mobile feature vulnerable

Samsung Find My Mobile service is said to be vulnerable to attack. Samsung describes its Find My Mobile as a way to manage your device in a secure way, where you can track and control your device remotely. ...

Oct 28, 2014 weblog
3 / 5 (3) 0

Biological sciences professor publishes pupfish research

Craig Stockwell, professor of biological sciences, has co-written a research article that evaluates the history of the Devil's Hole pupfish, which rapidly evolved following its isolation. The article published Sept. 17 in ...

Sep 30, 2014
not rated yet 0

'Bash' computer bug could hit millions (Update)

The US government and technology experts warned Thursday of a vulnerability in some computer-operating systems, including Apple's Mac OS, which could allow widespread and serious attacks by hackers.

Sep 25, 2014
5 / 5 (4) 0

Pakistan releases smuggled turtles into the wild

Pakistani officials and environmentalists on Monday released some 200 rare turtles into the River Indus after the reptiles were retrieved from a southwestern Chinese town where they were seized by customs ...

Sep 22, 2014
4 / 5 (1) 0

Better non-functional security tests for software

The integration of digital expert knowledge and automation of risk analyses can greatly improve software test procedures and make cloud computing more secure. This is shown by the latest results of a project ...

Sep 15, 2014
not rated yet 0

Study focuses on communities near polluted waterways

There's no such thing as a good place to have a natural disaster, nor has there ever been an appropriate site to release toxic pollutants. But scientists have long recognized that some areas can handle such catastrophes better ...

Sep 03, 2014
not rated yet 0

Evaluating system security by analyzing spam volume

The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company's spam volume to evaluate its security vulnerability through the SpamRankings.net ...

Jul 24, 2014
2 / 5 (1) 0