Monthly Archives: May 2012

Insight for CI Demo: Additional Session Added


May 18, 2012 By
Emily Blades

Due to high demand, we have added a second webinar presentation next Wednesday at 2PM EDT (GMT-0400) to accommodate multiple time zones. Here are the details for the presentation: Join Brian Fox this Wednesday, May 23 at 11AM EDT or 2PM EDT (GMT-0400) for a 30 minute tour of Insight for CI. In this demo, […]

Continue reading...

ZTE Confirms Security Hole In U.S. Phone


By
The Vigilant Application Owner

Reuters – (National) ZTE confirms security hole in U.S. phone. ZTE, the world’s fourth-largest handset vendor and one of two Chinese companies under U.S. scrutiny over security concerns, said one of its mobile phone models sold in the United States contains a vulnerability researchers said could allow others to control the device. The hole affects […]

Continue reading...

Apache Details OpenOffice 3.4 Security Fixes


May 17, 2012 By
The Vigilant Application Owner

H Security – (International) Apache details OpenOffice 3.4 security fixes. Following the release of Apache OpenOffice 3.4.0 the week of May 7, the Apache Software Foundation (ASF) detailed the security fixes included in the new version of the open source productivity suite. According to the ASF, the first stable release of OpenOffice under its governance […]

Continue reading...

High-ranked Sites Blacklisted By Google After Being Hijacked


May 16, 2012 By
The Vigilant Application Owner

Softpedia – (International) High-ranked sites blacklisted by Google after being hijacked. Zscaler experts scanned the first 1 million Web sites found in Alexa’s top listings and found 621 of them are blacklisted by Google, even though some of them are legitimate Web sites visited by numerous users every day. How can a legitimate Web site […]

Continue reading...

How does Insight handle conflicting OSS licenses?


By
Mike Hansen

As we’ve been busy building out the Insight product line we’ve spent significant time considering the issues associated with “conflicting” and “invalid” licenses — licenses which upon consumption preclude further redistribution without being in violation of the licensing terms.  Conflicting (or incompatible) licenses are problematic for development organizations using open source software as there is […]

Continue reading...

New Webinar: Gain Visibility & Control At Build Time with Insight for CI


May 15, 2012 By
Emily Blades

Join Brian Fox Wednesday, May 23 at 11AM EDT (GMT-0400) for a 30 minute tour of our latest innovation, Insight for CI. Brian will show you how Insight for CI will help you: Gain visibility and control at build time in Hudson and Jenkins. Find and fix license, security and quality problems quickly. Set rules […]

Continue reading...

Global Payments Breach Fueled Prepaid Card Fraud


May 14, 2012 By
The Vigilant Application Owner

Krebs on Security – (National) Global Payments Breach fueled prepaid card fraud. Debit card accounts stolen in a recent hacker break-in at card processor Global Payments were showing up in fraud incidents at retailers in Las Vegas and elsewhere, according to officials from one bank impacted by the fraud. At the beginning of March, Danbury, […]

Continue reading...

Fuzz-o-Matic Finds Critical Flaw In OpenSSL


By
The Vigilant Application Owner

Help Net Security – (International) Fuzz-o-Matic finds critical flaw in OpenSSL. Codenomicon helped identify a critical flaw in widely used encryption software. A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2, and DTLS can be exploited in a denial-of-service attack on both client and server software. The flaw was found […]

Continue reading...

Trend Micro Reveals Top Document Attack Vectors From April


By
The Vigilant Application Owner

SecurityWeek – (International) Trend Micro reveals top document attack vectors from April. Trend Micro researchers recently revealed just how prevalent the use of certain document types is among attackers. By far, the two most popular document formats for hackers targeting Microsoft Office software are Word and Excel files, which were used in a combined 90 […]

Continue reading...