<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How to identify vulnerabilities in common software products</title>
	<atom:link href="http://www.gfi.com/blog/identify-vulnerabilities-common-software-products/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/identify-vulnerabilities-common-software-products/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=identify-vulnerabilities-common-software-products</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: abigail</title>
		<link>http://www.gfi.com/blog/identify-vulnerabilities-common-software-products/comment-page-1/#comment-17540</link>
		<dc:creator>abigail</dc:creator>
		<pubDate>Tue, 04 Jan 2011 21:15:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2886#comment-17540</guid>
		<description><![CDATA[With the latest release of a wide range of Microsoft Windows based software patches before the holiday season, have there been any addressing the host of binary planting vulnerabilities? I think this a serious security vulnerability which affects some of the more widely used programs on the Microsoft Windows platform. If Microsoft doesn’t address this sooner or later, users might find themselves in a security pickle sooner rather than later.]]></description>
		<content:encoded><![CDATA[<p>With the latest release of a wide range of Microsoft Windows based software patches before the holiday season, have there been any addressing the host of binary planting vulnerabilities? I think this a serious security vulnerability which affects some of the more widely used programs on the Microsoft Windows platform. If Microsoft doesn’t address this sooner or later, users might find themselves in a security pickle sooner rather than later.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: balta graham</title>
		<link>http://www.gfi.com/blog/identify-vulnerabilities-common-software-products/comment-page-1/#comment-15726</link>
		<dc:creator>balta graham</dc:creator>
		<pubDate>Sun, 12 Dec 2010 17:46:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2886#comment-15726</guid>
		<description><![CDATA[I&#039;ll be attending a online and systems security seminar next week (I can&#039;t imagine how they schedule these things so close to the holidays) and noticed that binary planting vulnerabilities to be part of one of the main talks. I guess they must stand to be a real threat to security to be highlighted like that. But thanks for the brief overview, looks like I&#039;ll be ahead of the curb (by a bit) when I get to the seminar.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;ll be attending a online and systems security seminar next week (I can&#8217;t imagine how they schedule these things so close to the holidays) and noticed that binary planting vulnerabilities to be part of one of the main talks. I guess they must stand to be a real threat to security to be highlighted like that. But thanks for the brief overview, looks like I&#8217;ll be ahead of the curb (by a bit) when I get to the seminar.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/identify-vulnerabilities-common-software-products/comment-page-1/#comment-10429</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Mon, 27 Sep 2010 04:08:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2886#comment-10429</guid>
		<description><![CDATA[Good post! Hackers get sneakier every day. There&#039;s a new wave of plug and play spam that may be related to this. It uses Javascript to launch a variety of exploits without the victim having to do much of anything. The messages come with the contact information of a very real, very legit company in the signature line to further trick their victims.]]></description>
		<content:encoded><![CDATA[<p>Good post! Hackers get sneakier every day. There&#8217;s a new wave of plug and play spam that may be related to this. It uses Javascript to launch a variety of exploits without the victim having to do much of anything. The messages come with the contact information of a very real, very legit company in the signature line to further trick their victims.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 07:06:11 by W3 Total Cache --