Archive for the ‘Free Software’ Category

Criminal Case Hack v3.1 – Free Software Download No Survey – Video


Criminal Case Hack v3.1 - Free Software Download No Survey
Criminal Case Hack v3.0 - Updated 2013.exe --- Size: 7 MB Download link (2013): http://hacks-games.com/criminal-case-hack-v3-0/ INSTRUCTIONS: 1.After download, run "Criminal Case Hack v3.0...

By: KathleenMejia876

Read the original here:
Criminal Case Hack v3.1 - Free Software Download No Survey - Video

Video sales letter ABC – Video


Video sales letter ABC
http://scrnch.me/m8fa7 Video Sales Letters ABC. Check out my Video Sales Letters ABC and discover how Video Sales Letters ABC can help you Discover how easy ...

By: Online Money Making Best Affiliate Programs

Follow this link:
Video sales letter ABC - Video

Minecraft: The Walking Dead Prison Map – Video


Minecraft: The Walking Dead Prison Map
MAP DOWNLOAD: Coming Soon TEXTURE PACK: http://adf.ly/MKkzw STORE: http://adf.ly/JxAQb Minecraft: The Walking Dead Prison. I have been working on this projec...

By: FieldGamers

Read the original:
Minecraft: The Walking Dead Prison Map - Video

Software vendors should respond to actively attacked vulnerabilities within seven days, Google says

Google threw the gauntlet down before the software industry to clean up its mistakes faster than has been done in the past.

Critical vulnerabilities in software programs being actively exploited by hackers should be made public seven days after a software vendor is made aware of the flaw by whomever discovered it, the company advocated in a blog posted Wednesday by Google security engineers Chris Evans and Drew Hintz.

Seven days is an aggressive timeline and may be too short for some vendors to update their products, but it should be enough time to publish advice about possible mitigations, such as temporarily disabling a service, restricting access, or contacting the vendor for more information, the pair wrote.

For flaws not being actively exploited by online marauders, Google continues to support giving software vendors 60 days to address a flaw before it is made public by its discoverer.

Actively exploited vulnerabilities, however, are special cases that need special attention, they argue.

The reason for this special designation is that each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more computers will be compromised, they wrote.

Googles zeal for quick action may be a harsh solution that could do more harm than good, argued Trusteer Vice President Yishay Yovel.

What Google is doing isnt going to accelerate the patching process, he told PCWorld. In fact, it will notify the hacker community about yet another opportunity it will have to attack enterprises.

Pushing patches out in seven days wont speed up the process of mitigating the vulnerability because organizations will continue to be slow in installing the patches pushed to them. What were seeing in the marketplace is hackers targeting vulnerabilities that are two years old, Yovel said.

Thats because organizations often dont patch, he added. They just dont get to it.

More here:
Software vendors should respond to actively attacked vulnerabilities within seven days, Google says

The Case For a Government Bug Bounty Program

47012535 story Posted by Soulskill on Friday May 31, 2013 @04:31PM from the 40-cents-for-a-cockroach,-75-cents-for-a-bedbug dept. Trailrunner7 writes "Bug bounty programs have been a boon for both researchers and the vendors who sponsor them. From the researcher's perspective, having a lucrative outlet for the work they put in finding vulnerabilities is an obvious win. Many researchers do this work on their own time, outside of their day jobs and with no promise of financial reward. The willingness of vendors such as Google, Facebook, PayPal, Barracuda, Mozilla and others to pay significant amounts of money to researchers who report vulnerabilities to them privately has given researchers both an incentive to find more vulnerabilities and a motivation to not go the full disclosure route. This set of circumstances could be an opportunity for the federal government to step in and create its own separate bug reward program to take up the slack. Certain government agencies already are buying vulnerabilities and exploits for offensive operations. But the opportunity here is for an organization such as US-CERT, a unit of the Department of Homeland Security, to offer reasonably significant rewards for vulnerability information to be used for defensive purposes. There are a large number of software vendors who don't pay for vulnerabilities, and many of them produce applications that are critical to the operation of utilities, financial systems and government networks. DHS has a massive budgeta $39 billion request for fiscal 2014and a tiny portion of that allocated to buy bugs from researchers could have a significant effect on the security of the nation's networks. Once the government buys the vulnerability information, it could then work with the affected vendors on fixes, mitigations and notifications for customers before details are released." You may like to read: Post

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...

See the article here:
The Case For a Government Bug Bounty Program