Security Blog

The latest news and insights from Google on security and safety on the Internet

Disclosure timeline for vulnerabilities under active attack

29. svibnja 2013.
Share on Twitter Share on Facebook
Google

Broj komentara: 7 :

ëRiC kaže...

Incredible that this is still debated at all! If you have wide spread software and there is a critical security hole: You fix it! NAO!

7 days is nice as a start. But actually bits and bytes know speed a little different than us puny humans. 7 days is enough to infect the whole world!

30. svibnja 2013. u 06:02
chillzwerg kaže...

Better and faster security. Superb!

30. svibnja 2013. u 11:14
voodooKobra kaže...

I approve of this maneuver. If the vendor doesn't respond after a week, they cannot be trusted to secure their customers.

30. svibnja 2013. u 14:41
killbit kaže...

This is a fantastic policy for companies that are cloud based such as good. However those companies that provide enterprise software a customer has to install and test. is NOT going to be able to fix, test, release to customer, customer pick up the fix, customer test, submit change requests and deploy in < 7 days. You guys are going to expose more customers to these sorts of issues. Why not work with the companies to release guidance if they can't fix the issue. Google has no idea about enterprise customers. No enterprise is going to pick up any software from you they have to deploy.

30. svibnja 2013. u 16:15
Unknown kaže...

I like it. Way to keep us safe :-D

30. svibnja 2013. u 16:37
Anonimno kaže...

Will you also be holding the rest of Google to the same standard?

31. svibnja 2013. u 09:36
Joe Philipps kaže...

Compared to some researchers, this is charitable. A certain proportion of them think full disclosure should be the norm so that the affected parties can begin to mitigate the trouble.

31. svibnja 2013. u 15:27

Objavi komentar

  

Oznake


  • #sharethemicincyber
  • #supplychain #security #opensource
  • AI Security
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2026
    • tra
    • ožu
    • velj
    • sij
  •     2025
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2024
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2023
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2022
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2021
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2020
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2019
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2018
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2017
    • pro
    • stu
    • lis
    • ruj
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2016
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2015
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2014
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • tra
    • ožu
    • velj
    • sij
  •     2013
    • pro
    • stu
    • lis
    • kol
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2012
    • pro
    • ruj
    • kol
    • lip
    • svi
    • tra
    • ožu
    • velj
    • sij
  •     2011
    • pro
    • stu
    • lis
    • ruj
    • kol
    • srp
    • lip
    • svi
    • tra
    • ožu
    • velj
  •     2010
    • stu
    • lis
    • ruj
    • kol
    • srp
    • svi
    • tra
    • ožu
  •     2009
    • stu
    • lis
    • kol
    • srp
    • lip
    • ožu
  •     2008
    • pro
    • stu
    • lis
    • kol
    • srp
    • svi
    • velj
  •     2007
    • stu
    • lis
    • ruj
    • srp
    • lip
    • svi

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms