Thomas Kristensen

Thomas Kristensen
Thomas Fauerskov Kristensenis a Danish footballer who plays as a midfielder for Brisbane Roar in the A-League. Kristensen has been capped eleven times for the Danish national team...
comparing good numbers points steve
I think Steve has got some good points on why comparing vulnerability numbers is difficult.
bug highly itself placed unlikely
While the bug in itself could look like a back door, I find it highly unlikely that it actually is a deliberately placed back door.
aware code exploit happen likely since systems
We aren't aware of any systems that have been compromised yet, but it's likely to happen since there's exploit code out.
concerned less linux might patches problem until users using
Users should be less concerned if the application they're using is from a Linux distributor, because they have patches available. But with third-party vendors, users might not know about the problem until they read about it.
attack cases code crash few launch malicious media open player three tries work
Three of the vulnerabilities can launch malicious code that allows an attacker to snoop on users. The other vulnerability is a DOS attack that will only work in a few cases and crash the media player when it tries to open a file.
company connected connection easy might parts printers since
Since printers are connected to the network, they can be vulnerable. Attackers might use a printer connection to get to other parts of a system, and sometimes it's very easy to get into a company that way.
equally few including open red source
Only a few companies, including the open source vendor Red Hat, handles vulnerabilities in an equally responsible way.
bother limited linux mac true users virus vulnerable
Why bother writing a virus for Linux and Mac when you can get so many other users by writing one for Windows? This is especially true because, for a virus to become serious, it has to find other vulnerable systems, and with Macs, that would be a very limited spread.
create difficult months patches users
Vendors can take months to create patches, and sometimes users grumble about that, ... But the alternative is to have patches that can be circumvented or aren't appropriate for the vulnerability. It's a difficult balance.
amount available certainly extremely given information limited number patches people serious vulnerable
It certainly is a serious threat, but given the amount of information available from Cisco you would think there would only be an extremely limited number of vulnerable systems. Most people should have patches in place before there are any exploits.
danger people rating sparingly
We don't have an 'extremely critical' ranking very often. We use the rating sparingly so people will know when the danger is very serious.
apple computers couple dealing issues past
Apple has done much better at dealing with issues in the past couple years than it did before.
attachment click large lotus number problem receive remote systems users vulnerable
This is big problem because a very large number of corporations use Lotus Notes. When users receive an e-mail with an attachment, all they have to do is click on the attachment to read it, and their systems are vulnerable to a remote attack.
intercept message signature
Someone who's able to intercept the message as it's transmitted could inject some data, and then the person who verifies the signature would be told it's a valid, unaltered message.