For the millions of us who fly regularly, these sorts of incidents, and the prospect of would-be terrorists testing the vulnerability of airplane security, brings up the questions of when passengers should intervene, and what they should do.
But White Lodging, the Hyatt franchisee that manages the Houston hotel, believes that the rooms were opened using a device that takes advantage of a glaring security vulnerability in keycard locks built by the lock company Onity, specifically a model of lock that appears in at least four million hotel rooms worldwide.
FORBES: Security Flaw In Common Keycard Locks Exploited In String Of Hotel Room Break-Ins
To demonstrate the vulnerability, the Department of Homeland Security and Idaho National Laboratory in Idaho Falls recently showed reporters a cyberattack on a mock-up of a chemical facility.
Shortly thereafter, Microsoft issued a statement saying that it does not consider the results of the jailbreak to be part of a security vulnerability, and that the circumvention method may not be available for long.
FORBES: Microsoft Actually Applauds Hacker For Windows RT Jailbreak Attempt
Turns out Google wanted to take care of that security vulnerability discovered in the browser that could allow keystroke capture when users visit malicious sites, so they put a cork in the RC28 delivery for a minute or two while they cooked up 29 to take its place.
ENGADGET: A tale of three firmwares: comparing the T-Mobile G1's RC19, 28, and 29 builds
And no doubt that the company will, given the incredibly simplicity of exploiting this security vulnerability.
FORBES: Careful, iPhone Owners: Simple Backdoor Lets Anyone Bypass Password Protection
When Internet providers fix the vulnerability, OpenDNS will lose some of its security appeal and return to pitching itself as a quick and cheap Web filter.
In an interview with MSNBC, the researchers stated that they found a security vulnerability in the embedded systems of HP Laserjet printers that would allow new commands to be issued to the printer by posing as a firmware update.
FORBES: Hackers May Be Able To Access Networked Printers - And Set Them On Fire
Invest in research on how to reduce Internet security vulnerability and computers that are part of the Internet.
"Four days is typically not enough to complete the initial investigation of the vulnerability and thoroughly test a comprehensive update, " said Mike Reavey, director of Microsoft's security response center.
Secretary Weinberger will also be remembered for the seminal role he played in shifting the national paradigm from one of deliberate vulnerability to ballistic missile attack to one in which anti-missile defenses are part of a comprehensive homeland security posture.
"Microsoft is investigating new public reports of a possible vulnerability in Windows, " said a security advisory on its website.
They suggest using Microsoft Baseline Security Analyzer (MBSA) for vulnerability scanning but of course there are many options from free to expensive.
FORBES: Vulnerability Intelligence Versus Vulnerability Management
It takes an enormous amount of security, courage, and self respect to show vulnerability, to share credit, and to transcend envy and jealousy.
Researchers at Independent Security Evaluators have used the vulnerability to take malicious control of the iPhone from rogue websites loaded with the exploit.
ENGADGET: Safari exploit gives hackers full control over iPhones and possibly PCs and Macs
To really make a ground-breaking shift in mobile app security someone should open an app store that requires apps to run through a suite of security checks including code audits, fuzz testing and vulnerability assessments.
Researcher Craig Heffner presented a paper at the Black Hat security conference in Las Vegas that exposed another vulnerability in millions of routers that would allow hackers to hijack a user's Web surfing.
The fanfare attending Monday's signing by President Bush of the legislation establishing the Department of Homeland Security inspired hope that the United States' pervasive vulnerability to attack would shortly begin to be redressed.
Water is the common thread that links together much of what you addressed: poverty reduction, food security, and reducing vulnerability to disasters.
The vulnerability was highlighted by Ravi Borgaonkar at the Ekoparty security conference, and makes use of USSD codes that are normally used by handsets to communicate with the carriers.
For alarmists about the Chinese naval buildup, the question is under what possible regional or global security system would China remain comfortable with this level of strategic and economic vulnerability.
After months of inaction and even a warning from the Department of Homeland Security, Oracle has finally released a fix for yet another security vulnerability in its ubiquitous and notoriously buggy Java software.
FORBES: Forget Oracle's Latest Java Patch. Just Kill The Program In Your Browser For Good
For example, the funding agencies of the Belmont Forum have established joint calls that will bring together new international partnerships of social and natural scientists working on specific themes, such as freshwater security and coastal vulnerability.
After all, the GOP has been seen as more robust on national security than the Democrats for a generation and much of the blame for our present vulnerability could rightly be laid at the feet of the Obama administration.
For all the very real advantages of a smart grid, however, its number one vulnerability has still not been adequately addressed: cyber-security.
FORBES: FERC Chair Wellinghoff on Why a 'Smart Grid' is Stupid About Cyber-Security
According to a study by Web-focused security firm White Hat Security last year, at least two-thirds of sites suffer from some form of the vulnerability.
But they illustrate the vulnerability of Google's new platform, and raise the question of who's responsible for OpenSocial's security: application developers, social networking sites or Google itself?
But the vulnerability of critical infrastructure systems, mostly owned by the private sector, has slowly emerged as a real threat to national security.
My friend Aviram Jenik at Beyond Security tells me that over half the enterprises his sales team approaches are unaware of the need for vulnerability management!
FORBES: Vulnerability Intelligence Versus Vulnerability Management
应用推荐