Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Perimeter posted in August 2007
Phishers Play Top 40
News  |  8/31/2007  | 
Latest spam pretends to be video from your favorite musical artist
On the Trail of 'Fast Flux' Botnets
News  |  8/29/2007  | 
Stealth botnet method makes botnets hard to kill, but not impossible
China's Premier 'Gravely Concerned' by Hack on Germany
News  |  8/27/2007  | 
Top-ranked officials discuss alleged cyber attack at diplomatic meeting
Crypto Makes the Grade at Baylor
News  |  8/23/2007  | 
University taps PGP to protect faculty, staff laptops - and to comply with state laws in the event of data loss
Slammer, Other Older Threats Making a Comeback
News  |  8/23/2007  | 
Researchers at IBM ISS say Slammer is the most common network threat they see today due to 'retired' signatures
Ukranian Suspect Could Help Break TJX Case
News  |  8/22/2007  | 
Details of the TJX hack begin to rapidly unfold thanks to a recent arrest
Researchers: Bugs Can Turn Security Tools Against Their Users
News  |  8/17/2007  | 
Parser flaws can cause defense-in-depth to backfire
Skype: We're Not Hacked
News  |  8/17/2007  | 
Massive outage caused by problems with software, not with attackers, company says
Sourcefire Buys Open-Source Antivirus Project
News  |  8/17/2007  | 
ClamAV software used in UTM, Web gateway, and email gateway products
Back to School: Backpacks, Books & Bots
News  |  8/15/2007  | 
Universities brace for increase in security breach attempts as students - and profs - return to campus
Visa Eases PCI Compliance Penalties
News  |  8/14/2007  | 
Deadlines extended, some fines may be reimbursed if merchants act quickly
Report: Web 'Mean Streets' Pervasive
News  |  8/14/2007  | 
New Honeynet Project research finds malicious Web servers in all corners of the Web, studies their behavior
Novell Buys Endpoint Security Management Firm
News  |  8/13/2007  | 
Purchase of Senforce Technologies rounds out Novell's security management portfolio
New Tool Helps Lock Down Linux
News  |  8/13/2007  | 
Trusted Computer Solutions to launch Security Blanket for Red Hat environments
XeroBank Launches Anonymizing Tool Suite
News  |  8/8/2007  | 
XeroBank, formerly known as Torrify, offers up 'rubber glove' against malware and prying eyes
New Bank Practices Make Hacking Easier
News  |  8/8/2007  | 
New multifactor logon procedures actually improve attacker's chances of breaking in, expert says at DefCon
The ROI of Attack
News  |  8/8/2007  | 
Like defenders, attackers sometimes need to weigh the costs and benefits of their efforts
Assume Your Laptop Will Be Stolen
News  |  8/7/2007  | 
IT and end users should plan for the worst when it comes to portable data and computing
Study Finds Spammers' Weak Spot
News  |  8/7/2007  | 
Junk email distributors are much more vulnerable at the receiving end than at the sending end, research finds
Malware: Serious Business
News  |  8/6/2007  | 
At DefCon, a university researcher reveals the ins and outs of the vulnerability market
Feds Turn to Black Hats
News  |  8/3/2007  | 
Top cybercops want hackers to stop beating them and join them
Analytics: Reaching Outside Security
News  |  8/2/2007  | 
Text mining, behavioral analysis may lead to better understanding of attack data, researcher says
'Sidejacking' Tool Unleashed
News  |  8/2/2007  | 
Lets attackers sniff and access Web accounts over WiFi
New Threat: Network Eavesdropping
News  |  8/1/2007  | 
Smart hackers can execute surprising exploits just by watching your traffic, experts say


Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23901
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
CVE-2020-17532
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd