Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in February 2007
Page 1 / 2   >   >>
Innovation's Dead
News  |  2/28/2007  | 
Vendors excel at fear-mongering, but fall well short where technical creativity or capabilities are concerned
Heads in the Sand
News  |  2/28/2007  | 
Everyone loses when threats of legal action get made to forestall vulnerability disclosure
HID, IOActive Butt Heads Again
News  |  2/28/2007  | 
Rights and responsibilities of how, when to disclose vulnerabilities get revisited at Black Hat
Government Targets Insider Threat
News  |  2/28/2007  | 
Defense, Justice, and HUD developing new strategies for stopping internal security leaks
Apple Flap Redux
News  |  2/28/2007  | 
David Maynor goes public at Black Hat DC on his side of the Apple wireless exploit story
A Hacker by Any Other Name
News  |  2/27/2007  | 
Black hat? Gray hat? Carder? Cracker? Putting a name on today's hacker is no simple task
Security's Symbiosis
News  |  2/27/2007  | 
Let's face a simple truth: Hackers (white and black hat alike) and vendors need each other
VZW Wins Against SMS Spammers
News  |  2/27/2007  | 
Firm ordered to pay $200,000 damages for sending SMS spam to mobiles, Sophos comments
Black Hat Cancels RFID Demo
News  |  2/27/2007  | 
Badge, smartcard patent holder threatens lawsuit over cloning presentation
How to Cheat Hardware Memory Access
News  |  2/27/2007  | 
Researcher Joanna Rutkowska will demonstrate how to derail forensics' search for malware in the OS
Norton Goes Online
News  |  2/26/2007  | 
Symantec rolls out new combination security and online backup service for consumers
PatchLink Acquires Harris's Suite
News  |  2/26/2007  | 
PatchLink announced the acquisition of STAT Guardian Vulnerability Management Suite from Harris Corporation
Five Myths About Black Hats
News  |  2/26/2007  | 
In our breakout survey of those who break in, black hats attempt to rewrite conventional wisdom about their motives, methods
More of a Gray Area
News  |  2/26/2007  | 
Blacklisting's about to become passe as major AV companies look to whitelisting's potential
Here Comes the (Web) Fuzz
News  |  2/26/2007  | 
Black Hat researcher says fuzzing Web applications is the next big thing, will release free tool
Symantec Intros Norton 360
News  |  2/26/2007  | 
Symantec announced the availability of the newest product to join its award winning line of Norton products - Norton 360
Chico's Chooses Liquid Machines
News  |  2/25/2007  | 
Leading specialty clothing retailer Chico's chooses Liquid Machines to protect its intellectual property and confidential information
RSS Syndicates Malware, Too
News  |  2/23/2007  | 
RSS becoming another delivery mechanism for XSS and other Web-related exploits
Black Hats Focus on Apps
News  |  2/23/2007  | 
DC convention shows security researchers are shifting away from network infrastructure - and toward applications
Pharmed Out Passwords
News  |  2/22/2007  | 
A simple change to wireless password defaults could make a world of difference, and possibly render this issue moot
Smart & Safe
News  |  2/22/2007  | 
Smartphones are a favorite new hacker target, and there's plenty you can do to lock 'em down
Vulnerability Found in Google Desktop
News  |  2/21/2007  | 
Watchfire announced its security researchers have discovered a vulnerability in Google Desktop
Black Hat: Botnets Go One-on-One
News  |  2/21/2007  | 
Botnets are changing channels and fighting back at researchers
Cisco's Web Security Play
News  |  2/21/2007  | 
Acquisition of Reactivity could pave way to network-based solutions for Web 2.0, SOA
VMs Create Potential Risks
News  |  2/21/2007  | 
Convenient and efficient, virtual machines can also increase your security exposure
Careless Whispers
News  |  2/21/2007  | 
The problem with unsecured wireless is you never know who's listening, or what they'll do with what they hear
Sophos Announces New CFO
News  |  2/20/2007  | 
Sophos announced that it has appointed Paul Smolinski to chief financial officer, global operations
Daylight Saving Switch Won't Help Hackers
News  |  2/20/2007  | 
Daylight Saving Time changes won't have a big impact on security, but some things could fall through the cracks
Security Outsourcing Heats Up
News  |  2/20/2007  | 
Security has become one of the key drivers in the managed services market, says Harris Interactive
Vendor Chooses WhiteHat
News  |  2/20/2007  | 
WhiteHat Sentinel provides timely, comprehensive Website vulnerability assessment of e-commerce shopping cart platform
Why Do You Hack?
News  |  2/20/2007  | 
New Dark Reading survey seeks the motives and methods behind your efforts to penetrate others' systems
Let's Wrestle for It
News  |  2/18/2007  | 
A grab-n-go with a suspect employee's laptop turns unexpectedly physical
Tool Uncovers Inadvertent 'Chatter'
News  |  2/16/2007  | 
Errata Security to release tool at Black Hat later this month that demonstrates 'data seepage' via WiFi
Giving Up Hope on Users
News  |  2/16/2007  | 
Expect any help from end users on security? Time to get real
Insider Tries to Steal $400 Million at DuPont
News  |  2/16/2007  | 
Unusual computer activity is tipoff in successful case against chemist who tried to steal intellectual property for his new employer
Data to Drown In
News  |  2/16/2007  | 
How do you keep from getting sucked under by all the management data that security systems spit out?
New 'Drive-By' Attack Is Remote
News  |  2/15/2007  | 
Symantec and Indiana University researchers build proof-of-concept exploit preying on businesses and homes with broadband routers
3G Card Secures Laptops
News  |  2/15/2007  | 
3G cellular-based add-on secures data in the event of malware infection, laptop loss, or theft
Digging Into Motivation
News  |  2/15/2007  | 
Or, how to blunt the bad guys' advantage and incent users to make smarter choices
AppLabs Undertakes Testing
News  |  2/14/2007  | 
FutureBazaar partners with AppLabs Technologies for security testing
Wait for WAFs
News  |  2/14/2007  | 
Web application firewalls are a first step in getting on top of Web security - but these devices still have a ways to go
I Love You, Sucker
News  |  2/14/2007  | 
Maybe malware writers just need a hug
Getting Users Fixed
News  |  2/13/2007  | 
Dark Reading roundtable addresses the value of end-user security training - or lack thereof
10 Signs an Employee Is About to Go Bad
News  |  2/13/2007  | 
Worried that you might have an insider threat? Here are some warning signs
Study: Two Hacks a Minute
News  |  2/13/2007  | 
Researchers at the University of Maryland show firsthand why weak passwords are a hacker's dream come true
Licensed to Surf
News  |  2/13/2007  | 
Users who don't use the Web safely are a danger to others on the Internet. Is it time to force surfers to carry a license?
Cloudmark Adds Messaging Security
News  |  2/13/2007  | 
Cloudmark is introducing Cloudmark Authority for Mobile Operators
Acunetix: 70% of Websites Hackable
News  |  2/12/2007  | 
Acunetix revealed that on average 70% of websites are at serious and immediate risk of being hacked
Data Destruction, at Your Disposal
News  |  2/12/2007  | 
Regulatory pressure, data leakage force enterprises to look at more secure disposal practices
Don't Ask, Don't Telnet
News  |  2/12/2007  | 
New zero-day telnet bug in Solaris reveals low-profile vulnerability in the OS
Page 1 / 2   >   >>


Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
CVE-2021-1071
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...