Monthly Archives: May 2012

ZTE Confirms Security Hole In U.S. Phone


By
The Vigilant Application Owner

Reuters – (National) ZTE confirms security hole in U.S. phone. ZTE, the world’s fourth-largest handset vendor and one of two Chinese companies under U.S. scrutiny over security concerns, said one of its mobile phone models sold in the United States contains a vulnerability researchers said could allow others to control the device. The hole affects […]

Continue reading...

Categories: Uncategorized

Apache Details OpenOffice 3.4 Security Fixes


May 17, 2012 By
The Vigilant Application Owner

H Security – (International) Apache details OpenOffice 3.4 security fixes. Following the release of Apache OpenOffice 3.4.0 the week of May 7, the Apache Software Foundation (ASF) detailed the security fixes included in the new version of the open source productivity suite. According to the ASF, the first stable release of OpenOffice under its governance […]

Continue reading...

Categories: Uncategorized

High-ranked Sites Blacklisted By Google After Being Hijacked


May 16, 2012 By
The Vigilant Application Owner

Softpedia – (International) High-ranked sites blacklisted by Google after being hijacked. Zscaler experts scanned the first 1 million Web sites found in Alexa’s top listings and found 621 of them are blacklisted by Google, even though some of them are legitimate Web sites visited by numerous users every day. How can a legitimate Web site […]

Continue reading...

Categories: Uncategorized

How does Insight handle conflicting OSS licenses?


By
Mike Hansen

As we’ve been busy building out the Insight product line we’ve spent significant time considering the issues associated with “conflicting” and “invalid” licenses — licenses which upon consumption preclude further redistribution without being in violation of the licensing terms.  Conflicting (or incompatible) licenses are problematic for development organizations using open source software as there is […]

Continue reading...

Categories: Uncategorized

Trend Micro Reveals Top Document Attack Vectors From April


By
The Vigilant Application Owner

SecurityWeek – (International) Trend Micro reveals top document attack vectors from April. Trend Micro researchers recently revealed just how prevalent the use of certain document types is among attackers. By far, the two most popular document formats for hackers targeting Microsoft Office software are Word and Excel files, which were used in a combined 90 […]

Continue reading...

Categories: Uncategorized