Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in March 2007
<<   <   Page 5 / 5
Joke's on Me
News  |  3/5/2007  | 
After a poor decision to use a public wireless link, I got 'hacked' at Black Hat DC
Deep Threat
News  |  3/5/2007  | 
Insiders pose increasing danger to safety of corporate data, according to two new studies published today
Blue Coat Announces Growth
News  |  3/4/2007  | 
Blue Coat Systems announced that SSL-encrypted traffic now represents a sizable amount of Wide Area Network (WAN) traffic
Got Time?
Commentary  |  3/2/2007  | 
That whole time-change thing that has everyone rolling their eyes -- you know, early daylight-saving time? OK, it's not Y2K. (What could be?) And as I noted in a recent column (which goes into this issue in greater detail), no one is talking disasters of biblical proportions. But there is a little more to this than the momentary irritation of missed appointments and calendars being off an hou
Security's Three Deadly Sins
News  |  3/2/2007  | 
It all boils down to sloth, hubris, and greed
Vint Cerf: Father Knows Best
News  |  3/2/2007  | 
Internet founder talks actors, Googlers, and hackers
Riverbed Steps on SSL Gas
News  |  3/2/2007  | 
Will add SSL traffic to its WAN optimization story next week
Postcard From the Public Sector
News  |  3/2/2007  | 
Despite limited budgets, public sector organizations break new ground in security
Tool IDs Hidden Malware
News  |  3/2/2007  | 
New software could make it easier for administrators to find malware needles in file haystacks
Infonetics Reports on Security
News  |  3/1/2007  | 
Content security gateway appliance revenue jumps 70% in 2006
10 Oracle Bugs in 10 Minutes
News  |  3/1/2007  | 
Black Hat researcher demos how to easily find database bugs with freely available tools
Getting to Know the Enemy Better
News  |  3/1/2007  | 
Industry players propose standards for describing vulnerabilities, attack patterns
Devices Interfere With WiFi
News  |  3/1/2007  | 
Farpoint Group's research validates other industry research on the effects of interference
Akonix Tracks Trends
News  |  3/1/2007  | 
Akonix tracks growing trend in IM attacks
Sophos Announces Top 10 Malware
News  |  3/1/2007  | 
Sophos has revealed the most prevalent malware threats causing problems for computer users worldwide during February 2007
EEye & BMC Team
News  |  3/1/2007  | 
EEye Digital Security announced it has entered into a strategic relationship with BMC Software joining the BMC MarketZone program
<<   <   Page 5 / 5

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.