2015/01/11 : Microsoft made a call for better coordinated vulnerability disclosure after that "Google has released information about a vulnerability in a Microsoft product, two days before [their] planned fix on [their] well known and coordinated Patch Tuesday cadence, despite [their]...Read more
2017/11/15 : "[T]he White House released a charter for the administration’s once-shadowy Vulnerabilities Equities Process (VEP)." (see : https://www.lawfareblog.com/...Read more
1994/12/01 : Christopher Klaus describes a proof of Bugtraq efficiency.
This artifact is part of the Bugtraq Bundle. Read more
2003/04/22 : Stephen A. Shepherd define what is responsible disclosure and make a summary of vulnerability disclosure history at this stage.Read more
1998/08/04 : Matt Richtel writes in the NY Times about Back Orifice.
Members of the hacker group "Cult of the Dead Cow," released the program "Back Orifice" 'to encourage Microsoft Corp. to pay closer attention to computer security issues.'
This artifact is part of the ...Read more
1998-1999 : Birth of the anti-Sec movement.
"We are the Ant-Sec movement, and we are dedicated to eradicating full-disclosure of vulnerabilities and exploits and free discussion on hacking related topics."
This artifact is part of the ...Read more
2000/07/26 : Ranum beggan a big debate with his keynote speech of the US Black Hat conference in Las Vegas, in 2000. Robert Lemos is here commenting what happened.
This artifact is part of the Bundle ...Read more
2001/08/15 : Elias Levy continues the full disclosure debate.Read more
2013/05/29 : Google agreed for 7-days to fix critical vulnerabilities.
"Based on our experience, however, we believe that more urgent action -- within 7 days -- is appropriate for critical vulnerabilities under active exploitation. The reason for this special designation is that...Read more
1995 : The program SATAN (Security Administrator Tool for Analysing Networks) had been written to scan a Unix host on a network and then issue a report about known security vulnerabilities as well as possible fixes. It was the first vulnerability scanning program which...Read more