Core Security In the News

Core Security has been mentioned or quoted in the following news articles.  

Published Datesort descending Link Source
05.06.2003 Security group: ICQ is flawed By Robert Lemos - CNET News.comZDnet
05.06.2003 ICQ Is Compromised, Says Security Firm Tech Web News
05.06.2003 Bevy of New ICQ Vulnerabilities Surface By Paul RobertsInfoWorld
05.07.2003 Several Security Flaws Found in ICQ By Paul Roberts, IDG News ServicePC
05.08.2003 New Flaws Found in ICQ By Paul Roberts, IDG News ServiceComputerworld
05.08.2003 Six Holes Found in AOL ICQ By Iain ThomsonVNUnet
05.08.2003 Hub Firm Takes AOL Software Bugs Public By Hiawatha Bray, Globe Staff, 5/8/
05.08.2003 Six holes found in AOL ICQ By Iain Thomson [08-05-2003]Network News
05.09.2003 Core Discovers Vulnerabilities in Mirabilis ICQ client SC InfoSecurity News
05.09.2003 Security Problems Persist With Instant Messaging By Jaikumar VijayanComputerworld
05.09.2003 Multiple Vulnerabilities in Mirabilis ICQ Client SecuriTeam
05.29.2003 Interview with Ivan Arce, CTO of Core Security Technologies By Berislav KucanHelp Net Security
07.03.2003 W2K Active Directory, NetMeeting Vulnerabilities Detailed Security experts say they don't yet know the full scope of two recently discovered Windows 2000 vulnerabilities.Microsoft released patches to correct both flaws last week.By Mathew SchwartzSecurity Wire Digest - Vol. 5, No. 50, July 3, 2003
07.30.2003 Core Impact Improves On Penetration Testing
08.12.2003 CSOinformer featuring Core Security Technologies Under the Radar - Resume-based Network Mapping
09.17.2003 New DB2 Flaws Could Prove Troublesome eWeek
09.17.2003 IBM Patching DB2 Vulnerability Flaw could let attackers run malicious code on DB2 using admin permissions.By Paul RobertsIDG News ServicesNetwokWorldFusion | Security.ITworld | InfoWorld
09.17.2003 IBM Posts Fix For DB2 Linux Security Flaw CNET
09.18.2003 Patch Issued For DB2 Vulnerability By Shawna McAlearneySecurity Wire Digest - Vol. 5, No. 70, September 18, 2003
09.18.2003 DB2 Vulnerability Allows Hackers To Gain Complete Control