Security Blog

The latest news and insights from Google on security and safety on the Internet

Disclosure timeline for vulnerabilities under active attack

29. maj 2013
Share on Twitter Share on Facebook
Google

7 kommentarer :

ëRiC sagde ...

Incredible that this is still debated at all! If you have wide spread software and there is a critical security hole: You fix it! NAO!

7 days is nice as a start. But actually bits and bytes know speed a little different than us puny humans. 7 days is enough to infect the whole world!

30. maj 2013 kl. 06.02
chillzwerg sagde ...

Better and faster security. Superb!

30. maj 2013 kl. 11.14
voodooKobra sagde ...

I approve of this maneuver. If the vendor doesn't respond after a week, they cannot be trusted to secure their customers.

30. maj 2013 kl. 14.41
killbit sagde ...

This is a fantastic policy for companies that are cloud based such as good. However those companies that provide enterprise software a customer has to install and test. is NOT going to be able to fix, test, release to customer, customer pick up the fix, customer test, submit change requests and deploy in < 7 days. You guys are going to expose more customers to these sorts of issues. Why not work with the companies to release guidance if they can't fix the issue. Google has no idea about enterprise customers. No enterprise is going to pick up any software from you they have to deploy.

30. maj 2013 kl. 16.15
Unknown sagde ...

I like it. Way to keep us safe :-D

30. maj 2013 kl. 16.37
Anonym sagde ...

Will you also be holding the rest of Google to the same standard?

31. maj 2013 kl. 09.36
Joe Philipps sagde ...

Compared to some researchers, this is charitable. A certain proportion of them think full disclosure should be the norm so that the affected parties can begin to mitigate the trouble.

31. maj 2013 kl. 15.27

Send en kommentar

  

Etiketter


  • #sharethemicincyber
  • #supplychain #security #opensource
  • AI Security
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2024
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2023
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2022
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2021
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2020
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2019
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2018
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2017
    • dec.
    • nov.
    • okt.
    • sep.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2016
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2015
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2014
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • apr.
    • mar.
    • feb.
    • jan.
  •     2013
    • dec.
    • nov.
    • okt.
    • aug.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2012
    • dec.
    • sep.
    • aug.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
    • jan.
  •     2011
    • dec.
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • jun.
    • maj
    • apr.
    • mar.
    • feb.
  •     2010
    • nov.
    • okt.
    • sep.
    • aug.
    • jul.
    • maj
    • apr.
    • mar.
  •     2009
    • nov.
    • okt.
    • aug.
    • jul.
    • jun.
    • mar.
  •     2008
    • dec.
    • nov.
    • okt.
    • aug.
    • jul.
    • maj
    • feb.
  •     2007
    • nov.
    • okt.
    • sep.
    • jul.
    • jun.
    • maj

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms