je.st
news
Tag: vulnerabilities
Biden Administration reports highlight supply chain vulnerabilities for batteries, critical materials
2021-06-09 12:56:08| Green Car Congress
Tags: reports
supply
administration
materials
Tool visualizes supply chain vulnerabilities
2021-02-15 14:09:00| National Hog Farmer
Researchers developed a model to geographically visualize supply chains, and applied the model for illustrative purposes to the grain farming industry.
Tags: supply
tool
chain
supply chain
Report: Open Source Vulnerabilities Rampant in Popular Projects
2020-03-12 20:31:32| TechNewsWorld
Open Source vulnerabilities rose by nearly 50 percent in 2019 over the previous year, based on a new report. Common vulnerabilities rated as high or critical severity were found in all of the most popular open source projects, according to the WhiteSource 2020 annual report, "The State of Open Source Security Vulnerabilities." The vulnerability rate is expected to continue rising.
Tags: report
popular
open
source
Open Source Is Everywhere and So Are Vulnerabilities, Says Black Duck Report
2018-05-15 14:00:00| TechNewsWorld
Black Duck by Synopsys has released the 2018 Open Source Security and Risk Analysis report, which details new concerns about software vulnerabilities amid a surge in the use of open source components in both proprietary and open source software. The report provides an in-depth look at the state of open source security, license compliance and code-quality risk in commercial software.
Tags: report
black
open
source
Vulnerabilities Abound in Popular Android Apps: Report
2018-04-18 19:11:01| TechNewsWorld
About 20 percent of the most popular Android Apps available through the Google Play Store contain open source components with known security vulnerabilities that can be exploited by hackers, according to a report Insignary will release next week. The findings are the result of the company's recent comprehensive binary code scan of the 700 most popular Android Apps on the Google Play Store.
Tags: report
popular
apps
vulnerabilities