Dec 09, 2013
Companies to develop tools and techniques to enable organizations to inspect software and firmware inside network-enabled devices
Private brokers sell zero-day bugs for anywhere between $40,000 and $160,000 -- and in some cases as much as $1 million, a new study says
DARPA debuts five different puzzle games to test whether players can spot mathematical flaws in open-source code used by the Defense Department
Research paper offers security advice for application developers for cloud environments
Attacking a PHP vulnerability patched a year-and-a-half ago, the new outbreak shows the Internet of Things' seams
Google tracks down unauthorized digital certificate, blocks intermediate certificate authority
Microsoft, FBI, and Europol say they have disrupted ZeroAccess, a botnet that infected more than 2 million machines
UBM Tech Events
- March 31-April 1, 2014
- March 31-April 4, 2014
Black Hat Events
- March 25-28, 2014
Other Security EventsLive Events Calendar
Free Research and Reports
Tom Quillin, Director of Cyber Security Technology & Initiatives, Intel Corporation
- Lock Three Doors To Protect Your Data
- Security and Identity Management: Innovative Authentication Techniques
- There is No Security Silver Bullet, but What if...
- Inside IT: Evaluating McAfee Deep Defender
- McAfee Threats Report: Second Quarter
- McAfee Deep Defender*: Hidden Malware Protection
- Business Benefits of Intel® vPro™ Technology
- New Reality of Stealth Crimeware with Intel and McAfee
Dark Reading Digital Magazine
Quick Wins For Strengthening SMB Security
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
Double free vulnerability in the vp3_update_thread_context function in libavcodec/vp3.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via crafted vp3 data.
The codec_get_buffer function in ffmpeg.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via vectors related to a crafted image size.
The decode_mb function in libavcodec/error_resilience.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via vectors related to an uninitialized block index, which triggers an out-of-bound write.
The smacker_decode_header_tree function in libavcodec/smacker.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via crafted Smacker data.
The ff_h264_decode_sei function in libavcodec/h264_sei.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via crafted Supplemental enhancement information (SEI) data, which triggers an infinite loop.