Core Security In the News

Core Security has been mentioned in the following news articles.  

Published Date Linksort ascending Source
01.15.2010 Alarming Network Glitch Makes the Internet Lose Track of Who is Who on Facebook Associated Press
05.07.2009 Air traffic systems and cyber attacks CNN
09.26.2007 AIM vulnerable to worm attack, researchers warn
09.26.2007 AIM is vulnerable to attacks Network World
04.27.2009 After cybersecurity review, Hathaway says White House should take lead ComputerWorld
01.08.2010 Adobe To Release Fix for Acrobat Security Hole Campus Technology
11.06.2008 Adobe Reader Flaw Leaves PCs Open to Attack PCWorld
11.16.2008 Adobe Reader Flaw Leaves PCs Open to Attack PCWorld
11.04.2008 Adobe Reader Flaw Leaves PCs Open to Attack eWeek
11.04.2008 Adobe Patches for Critical Vulnerabilities in Adobe Reader SC Magazine
11.04.2008 Adobe patches for critical vulnerabilities in Adobe Reader SC Magazine
05.04.2012 Adobe Patches Flash Player Bug as Hackers Attack IE for Windows eWEEK
02.20.2013 Adobe Issues Reader, Acrobat Security Updates to Stave Off Attacks eWEEK
10.30.2013 Adobe Hack Much Worse Than First Reported NewsFactor
10.04.2013 Adobe Breach: Was Source Code Real Target? eSecurity Planet
06.01.2009 Administration´s new cybersecurity policies could yield new security regulations and incentives for enterprises, experts say Dark Reading
04.24.2014 Activism's slippery slope: Anonymous targets children's hospital CSO Online
06.17.2008 A new iPhone hacking tool CSO blog
03.25.2003 A CORE software engineer, Sergio Sancho, is bronze medalist of the ACM-ICPC world finals Association for Computing Machinery - International Collegiate Programming Contest World FinalsSergio Sancho, working at Core's Research and Development Center in Buenos Aires, and his team (University of Buenos Aires) are Bronze Medalists and the Latin A
08.14.2002 <b>CORE SECURITY TECHNOLOGIES anuncia nova vers&atilde;o de sua plataforma de testes de invas&atilde;o</b> Empresa ir&aacute; oferecer workshop de &ldquo;hacking &eacute;tico&rdquo; com simula&ccedil;&atilde;o de ataques, al&eacute;m de programa &ldquo;Try & Buy&rdquo;