Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in January 2008
<<   <   Page 2 / 3   >   >>
SecureWorks: Attack Infected 10,000 Websites
News  |  1/18/2008  | 
SecureWorks discovers protection against massive Website attack infecting 10,000 Linux/Apache servers
Attackers Use New 'Call-Home' Method to Infiltrate Home Networks
News  |  1/17/2008  | 
Honeynet Project researchers witness stealthy new method of botnet communication
The Worst Reason to Buy a Scanner
News  |  1/17/2008  | 
Application scanning can speed the discovery of vulnerabilities, but it's no substitute for good app development
Internet 'Skinny-Dipping'
News  |  1/17/2008  | 
Why one of the founders of the firewall doesn't use a firewall
Comodo Launches Memory Firewall
News  |  1/17/2008  | 
Comodo launches Memory Firewall - one of the only ways to protect against buffer overflow attacks
Taiwan Says China Accounts for Most Cyber Attacks
Quick Hits  |  1/17/2008  | 
Neighboring countries battle it out with secret cyber armies of hackers, report says
New MySpace Spam Recruits Bots
News  |  1/17/2008  | 
New malicious spam exploits MySpace
Arbor Networks Acquires Ellacoya
News  |  1/17/2008  | 
Arbor Networks announces definitive agreement to acquire Ellacoya Networks
Malware Quietly Reaching 'Epidemic' Levels
News  |  1/16/2008  | 
New reports say malware increased by a factor of five to 10 in 2007
Expert: Mac Users Should Gird for Swell of Attacks
News  |  1/16/2008  | 
Rising popularity of Mac OS X, and of application-layer exploits may end Mac OS's security honeymoon, expert says
Sipera VIPER Lab's Top 5 VOIP Threats List
News  |  1/16/2008  | 
Sipera Viper Lab reveals top 5 VOIP threat predictions for 2008
Who Invented the Firewall?
News  |  1/15/2008  | 
The list of firewall 'inventors' is large and controversial. Who's really the firewall's daddy?
Hacking Webcams With Google
Quick Hits  |  1/15/2008  | 
All it takes to get in touch with your inner voyeur is a Google search
Newest Website Certification Label Is e-Icon
News  |  1/15/2008  | 
New internet trust mark certification makes onliners relax; Los Angeles company to eliminate e-fears
RADirect Named US Distributor of PineApp
News  |  1/15/2008  | 
PineApp appoints RADirect as its US distributor
Ounce Labs Enhances Source Code Analysis
News  |  1/15/2008  | 
Ounce Labs enhances source code analysis product to integrate security into software development; company contributes to open source community
Utimaco Upgrades DLP
News  |  1/14/2008  | 
Utimaco expands reach into data leakage prevention market with release of SafeGuard LeakProof
IRS Still Hasn't Fixed Security Problems
News  |  1/14/2008  | 
Agency has corrected only 29 of the 98 weaknesses cited in its review last year, GAO says
Locking Down the Multifunction Printer
News  |  1/14/2008  | 
Sharp has added change control to better secure its networked printers, but some experts say more software isn't the answer
Breach Security Revenues Up, Names New CEO
News  |  1/14/2008  | 
Breach Security 2007 revenues up 500% year-over-year; leading web application security provider announces new CEO to drive growth
To Make Firewalls Work, Work Together
News  |  1/14/2008  | 
Getting your perimeter security right often means working with sysadmins, networking folks, and others who have a stake in it
Did Hackers Win It for Hillary?
Quick Hits  |  1/14/2008  | 
As rival calls for recount in New Hampshire, TV documentary claims voting machines were easily hackable
RedSealAdds Wireless Threat Detection
News  |  1/13/2008  | 
RedSeal introduces new release to help identify hidden threats in wireless network deployments
An Inside Look at the Russian Business Network
News  |  1/11/2008  | 
New white paper gives insight on Russian Business Network activities
How to Make Vulnerability Scans Pay Off
News  |  1/11/2008  | 
Vulnerability scans are nice, but they aren't much use if you don't take action on the results
Teenage Hacker Takes Over Polish Tram System
Quick Hits  |  1/11/2008  | 
Boy operates public trams 'like a giant train set,' causing four derailments
Hacking and the Academy Awards
News  |  1/10/2008  | 
Fortify Software documentary illustrates impact of cybercrime on consumers, business
Spammers Abuse Online Storage, File-Sharing Services
News  |  1/10/2008  | 
Microsoft's Windows Live SkyDrive Beta and other freebie services ripe for spammers
PandaLabs Finds Trojans With Rootkit
News  |  1/10/2008  | 
PandaLabs detects trojans that use new form of Rootkit attack; rootkits designed to hide by replacing master boot record with one of their own
Printers Could Be Vulnerable to Spam
Quick Hits  |  1/10/2008  | 
'Cross-site printing' lets an attacker remotely print to an internal network and even send faxes
WestJet Chooses Tizor
News  |  1/9/2008  | 
WestJet chooses Tizor to monitor and secure sensitive data for CSOX and PCI
Storm Botnet Turned Toward Phishing Attacks
News  |  1/9/2008  | 
Major banks targeted in intensive phishing effort driven by infamous botnet
DDOS Botnets Thriving, Threatening
News  |  1/9/2008  | 
Group of Web-based botnets from Russia signals dangers of DDOS attacks worldwide
Health Care Security: Serious Business
News  |  1/9/2008  | 
Will recent court decisions make health care insiders sit up and take notice?
Web 2.0 Sites Increase Security Risks
News  |  1/9/2008  | 
Employees who access Web 2.0 sites from corporate computers increase the probability of corporate malware attacks and inadvertent data leakage
CA: Presidential Race, Olympics Targets in '08
News  |  1/9/2008  | 
CA internet security report forecasts top online threats for 2008
Zango Refutes Fortinet Report
News  |  1/8/2008  | 
Zango: Fortinet Facebook widget advisory untrue
SecureMac Intros Trojan Removal Tool
News  |  1/8/2008  | 
Company offers DNSChanger free Trojan removal tool for Mac OS X
F-Secure Offers Free PC Health Check
News  |  1/8/2008  | 
F-Secure health check service enables internet users to test their PCs' wellbeing
Competition May Be Driving Surge in Botnets, Spam
News  |  1/8/2008  | 
Market challenge from Nugache botnet may be pushing Storm's operators to expand, researcher says
Hospitals Go Under the Microscope
News  |  1/8/2008  | 
Upcoming security audits could cause ripples across the HIPAA compliance pond
SQL Injection Attacks Hit 70,000 Websites
Quick Hits  |  1/8/2008  | 
Automated attacks spread across government and education environments as well as commercial sites
FaceTime Releases Findings for 2007
News  |  1/8/2008  | 
FaceTime Releases IM and P2P Malware Findings for 2007
Secure Computing Wins in Anti-Malware Tests
News  |  1/8/2008  | 
Secure Computing's Webwasher anti-malware engine beats leading vendors to win top honors in comparative review
Suit Alleges Sloppy Security in Major Sears Site
News  |  1/7/2008  | 
Customer warranty information can be easily accessed by anyone, court filing says
Chinese Hackers Invade Pennsylvania
Quick Hits  |  1/7/2008  | 
State government forced to shut down several primary Websites
The Four Habits of Highly Effective Security People
News  |  1/7/2008  | 
Stephen Covey has ideas for security pros, too
Laying Down the Law
News  |  1/4/2008  | 
Security policy isn't worth much unless you enforce it properly. Here are some tips on how to handle enforcement in your organization
Sophos: Iframe Worm No. 1 in December
News  |  1/4/2008  | 
Only 30% of computer users think 2008 will be a better year for security
Tech Insight: Database Activity Monitoring
News  |  1/4/2008  | 
If you weren't concerned about unauthorized database access before, maybe now you should give a DAM
<<   <   Page 2 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29813
PUBLISHED: 2021-09-23
IBM Jazz for Service Management 1.1.3.10 and IBM Tivoli Netcool/OMNIbus_GUI is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a t...
CVE-2021-29814
PUBLISHED: 2021-09-23
IBM Jazz for Service Management 1.1.3.10 and IBM Tivoli Netcool/OMNIbus_GUI is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a t...
CVE-2021-29815
PUBLISHED: 2021-09-23
IBM Jazz for Service Management 1.1.3.10 and IBM Tivoli Netcool/OMNIbus_GUI is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a t...
CVE-2021-29816
PUBLISHED: 2021-09-23
IBM Jazz for Service Management 1.1.3.10 and IBM Tivoli Netcool/OMNIbus_GUI is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 204341.
CVE-2021-29832
PUBLISHED: 2021-09-23
IBM Jazz for Service Management 1.1.3.10 and IBM Tivoli Netcool/OMNIbus_GUI is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a t...