51 quotes about vulnerabilities follow in order of popularity. Be sure to bookmark and share your favorites!

Overall, they have improved, there's no doubt about that. But unless they move faster on some of these high-impact vulnerabilities, we'll always deal with rogue researchers finding the same things.

Steve Manzuik

I'm not surprised [WMF] exploited 16-bit code. If you look over the security vulnerabilities, more and more are affecting versions of Windows prior to Windows XP SP2 and Windows Server 2003, and that's a good sign that the beating Windows took in prior years is slowing and that XP SP2 has affected the behavior [of hackers].

Robert Helm

There needs to be a better assessment of what the vulnerabilities are and what constitutes vulnerability.

William Ramsay

But we shouldn't act as though the private sector doesn't have its act together and the government does. There are also significant vulnerabilities in government.

Michael Vatis

Mother Nature didn't make slate for the purpose of putting it on a roof. We did. We've taken out all of the vulnerabilities and disadvantages of the natural material.

John Humphreys

Given Mozilla's open and transparent approach, we are very detailed on how we publish our vulnerability reports, and we list each vulnerability separately. Other vendors don't. Other vendors often combine multiple vulnerabilities, for instance, into one security bulletin.

Chris Beard

There's no doubt that we have, as we always do in the nation, reacted to the reality of 9/11 here in the country as an aviation incident. There are other vulnerabilities to be dealt with.

James Loy

New vulnerabilities are continually uncovered, and systems are configured or used in ways that make them open to attack.

Dorothy Denning

This soap opera has done nothing to erase Hillary Clinton's vulnerabilities. She starts with 30 percent who would vote against her, no matter what. That's a pretty high stepping off point for a challenger.

Nelson Warfield

Application vulnerabilities, such as the issue in Windows Media Player, are a growing cause of concern.

Oliver Friedrichs

No question that the ports are one of the true vulnerabilities. So little cargo is inspected that the likelihood of getting something through a port is very high.

Jerry Hauer

There's a lot more incentive to hack an election if there are millions of voters and you can swing important races. Whereas, if only hundreds of voters are voting over the internet, there's going to be a lot less incentive to exploit the vulnerabilities.

David Wagner

There are companies that are paying for vulnerabilities, and with the commercial acquisition of vulnerability information, nobody knows how long [the attackers] are holding that information.

Dean Turner

The range and seriousness of the vulnerabilities patched in this update cause us great concern. The database products alone include 37 vulnerabilities, many rated as easily exploitable and some potentially allowing remote database access. Oracle has not yet experienced a mass security exploit, but this does not mean that one will never occur.

Rich Mogull

Microsoft has cleaned up its development process overall by emphasizing security threat analysis and reducing the attack surface in their code. They have made progress, so I am not surprised that there is less likely to be vulnerabilities in IE than in any other browser.

Ray Valdes

We started seeing huge vulnerabilities. And portions of those systems were extraordinarily secure. But they were Maginot Lines.

Scott Borg

There might be privately reported issues that end up being in that update that haven't been disclosed yet. When we put out the bulletin, we talk about the information in the vulnerabilities … with a beta, how does that work exactly? Do you put out a kind-of-a-bulletin?

Stephen Toulouse

I was accepted for a high-school internship program at Lawrence Livermore National Labs, where I conducted research on network security vulnerabilities and technology that could automate security weakness detection.

Christopher Klaus

Compared to earlier versions of Windows, there are a third less vulnerabilities because of the security development work we have done — and half the number of critical vulnerabilities.

Debby Fry Wilson

Critical Oracle vulnerabilities are being discovered and disclosed at an increasing rate, and exploit tools and proof-of-concept code are appearing more regularly on the Internet.

Rich Mogull

These vulnerabilities are increasingly being used to facilitate online fraud through the installation of malicious software on vulnerable computers. Symantec has already seen exploits for some of these vulnerabilities in the wild and recommends that users apply the updates as quickly as possible.

Oliver Friedrichs

As with every other age and the technologies that are developed, there are vulnerabilities you have to deal with. What you can do is [to] mitigate, to the best amount possible, the damage that can come from it.

Daniel Kuehl

Some soldiers continue to post sensitive information to Internet Web sites and blogs, i.e., photos depicting weapon system vulnerabilities and tactics, techniques and procedures.

Peter Schoomaker

Three of the vulnerabilities can launch malicious code that allows an attacker to snoop on users. The other vulnerability is a DOS attack that will only work in a few cases and crash the media player when it tries to open a file.

Thomas Kristensen

During decompression of RAR files, Symantec is vulnerable to multiple heap overflows allowing attackers complete control of the system(s) being protected. These vulnerabilities can be exploited remotely, without user interaction, in default configurations through common protocols such as SMTP.

Alex Wheeler

Buffer overflow is one of the most common flaws that produce security vulnerabilities in software. It's not a good thing, but it isn't unique either to closed- or open-source software.

Michael Goulde

While it is critical to address how children in detention are being treated, it is also crucially important to focus on reducing the vulnerabilities and circumstances that push children to the edge and into lifestyles which often result in law-breaking and criminality.

Roger Wright

We're in the process of investigating and addressing them. I think it is important to note that although these are potential vulnerabilities, there are no know exploits to them and they are not affecting customers today.

Bud Tribble

One of the main vulnerabilities of the Afghan Army is their logistics system.

Jason Kamiya

There are some extremely smart hackers out there using and sharing the tools that find these vulnerabilities. When Microsoft takes a long time to issue fixes, it sets up a dangerous situation.

Steve Manzuik

This is part of our regular, two-month upgrade cycle, and deals in part with eight vulnerabilities identified by us and our users.

Mike Schroepfer

It's extremely rare that the developers of any given piece of software find their own security flaws. Almost 100% of the time, it's a third party that discovers and publishes security vulnerabilities . . . I wouldn't even consider subscribing.

Keith Morgan

During decompression of RAR files Symantec is vulnerable to multiple heap overflows allowing attackers complete control of the system(s) being protected. These vulnerabilities can be exploited remotely without user interaction in default configurations through common protocols.

Alex Wheeler

The openness of these networks makes us vulnerable to attacks by a hostile agent, ... Vulnerabilities are of such a magnitude that to ignore them would be a dereliction of duty.

William Campbell

It's possible to prevent these vulnerabilities, but if doing so interferes with what developers feel they need in terms of features, then the features will come first and the security will come second.

Charles Kolodgy

Oracle is getting more attention. There are some really sharp people credited with finding some of these vulnerabilities.

Alfred Huger

I can't read anybody's minds, but up to this point in history no vendor has ever refused to sell to a willing jurisdiction who wants to purchase equipment. Ironically after Leon County conducted tests that revealed vulnerabilities to their e-voting systems, then nobody would sell to us.

Ion Sancho

We are pleased that Internet Security Systems is incorporating SCADA intelligence, related to tools we developed under a Department of Homeland Security research contract, into its overall offerings, ... Due to their inherent vulnerabilities, it is critical that special attention be placed on the security of SCADA protocols.

Dale Peterson

We recommend that users shield themselves before addressing vulnerabilities, but in this case they can't apply a shield and are exposed to possible attack until the patch is applied.

Rich Mogull

We have a number of vulnerabilities in our economies.

Klaus Schwab

I think the bottom line is that anybody that does disclosures of security vulnerabilities has to be very careful (so as to) not be accused of being a hacker. The computer trespass laws are very, very tricky.

Lee Tien

[One of the two critical vulnerabilities in the bulletin is within the Microsoft Distributed Transaction Coordinator (MSDTC), code that's used to coordinate any sort of transaction on multiple servers, such as database queries.] It's a service used primarily in enterprises, ... You don't see it much on smaller-scale servers or desktops.

Neel Mehta

We are moving to a more proactive stance, ... providing periodic pieces of information to better secure systems and address known vulnerabilities before they fall victim to various types of cyber attack.

Amit Yoran

There are a handful of very bright [13]-year-olds out there who can do remarkable things, and there are not-so-bright [13]-year-olds who have access to software designed by others to [detect] and explore security vulnerabilities.

Steven Aftergood

In addition to increasing their understanding of web vulnerabilities, the most important thing enterprises can do to secure their data is to use web site vulnerability scanning software, and to scan applications every time there is a code change.

Nick Galea

Large enterprise networks are typically exposed to hundreds of thousands of vulnerabilities and other security risks. The problem for IT teams is identifying the most critical high-priority risks and taking the necessary steps for remediation, ... Integrated vulnerability management and topology analysis should help organizations identify and appropriately prioritize remediation efforts.

Paul Proctor

We are always disappointed when researchers feel the need to publish details of vulnerabilities before a fix is available. What David Litchfield has done is put our customers at risk.

Duncan Harris

What we're doing is essentially the reverse of what a protocol analyzer does. A protocol analyzer examines the network for behavior or code that's out of line with standards or thresholds. Our security analyzer actually creates paths that are out of line with the protocols to identify vulnerabilities that may not have been detected yet.

Ajit Sancheti

I don't think a comparison of the raw count of vulnerabilities is representative of the security of a product.

Chris Beard

Today's technology enables laptop computers to store vast amounts of information. Laptop computers are a high-risk target for theft and require us to take special safeguards to protect them. The capabilities of laptop computers also create significant technical vulnerabilities. For example, infrared and modem capabilities can cause data to be transferred without the users' knowledge.

David Carpenter

These actions are financially motivated and aim to exploit the popularity of these search engines to increase visits to the pages with the altered results, ... To avoid this kind of attack, it is vital that users have reliable antivirus protection and keep their systems up-to-date, as the vulnerabilities used have often been in existence for some time.

Luis Corrons