Tuesday, September 27, 2005
Hi all- Alexandra Huft here again! I thought you might find it interesting to see “behind the scenes” of how a security vulnerability eventually becomes a security bulletin. So, I’ll start way back at the beginning. We receive reports from many different finders on issues that may or may not be a vulnerability.