Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in February 2008
Page 1 / 2   >   >>
'Phone Flu' Could Infect Mobile Devices
Quick Hits  |  2/29/2008  | 
Researchers demonstrate ability of wireless devices to pass viruses through close proximity
Tech Insight: Hacking Your Encryption Options
News  |  2/29/2008  | 
Choosing the right encryption solution isn't always easy
Researchers Name Top Six Spamming Botnets
News  |  2/28/2008  | 
Marshal researchers say six botnets are sending 85% of the world's spam
Study: Consumers Don't Use Anti-Phishing Defenses
News  |  2/27/2008  | 
Much-ballyhooed 'green bar' is lost on most end consumers
Stolen FTP Credentials Offered for Sale: Major Firms at Risk
News  |  2/27/2008  | 
Nearly 9,000 stolen FTP server admin credentials offered with an automated crimeware kit, Finjan says
Hacker Steals Data on 18M Auction Customers in South Korea
News  |  2/26/2008  | 
Chinese attacker asks for ransom on data, reports say
SNMP Joins Dark Side in New XSS Attack
News  |  2/26/2008  | 
Researchers show how the Simple Network Management Protocol can be abused for cross-site scripting attacks
New Tool Protects You From Antivirus Gone Wild
Quick Hits  |  2/26/2008  | 
German security firm releases product to plug little-known but dangerous holes in AV and email security
Agencies Fall Short on Protecting User Data
News  |  2/25/2008  | 
Government Accountability Office says many agencies still haven't met guidelines
Critical VMware Bug Breaks 'Barrier'
News  |  2/25/2008  | 
Core Security discovers VMware desktop software vulnerability with Shared Folders feature
Critics: Microsoft's 'Friendly Worm' Is a Dumb Idea
Quick Hits  |  2/22/2008  | 
Proposed method of deploying patches is swatted by industry experts
At Del Monte, New Apps Open a Can of Worms for Remote Access
News  |  2/22/2008  | 
Package of Cisco products helps food giant resolve security conundrum
'Live' VMs at Risk While in Transit
News  |  2/21/2008  | 
Black Hat researcher demonstrates how an attacker could gain control of a hypervisor when a VM is moved from one machine to another
Canadian Police Bust Huge Botnet Ring
News  |  2/21/2008  | 
Botnet enslaved a million PCs in 100 countries, authorities say
The Social Engineer's Toolbox
News  |  2/20/2008  | 
These are a few of our favorite things to bring along for a social engineering exploit
Black Hat Researcher Hacks Credit Cards
News  |  2/20/2008  | 
Newly released tool grabs credit card account ID data off magnetic strips, RFID chips
Mega-Spammer Nabbed in Japan
Quick Hits  |  2/20/2008  | 
Twenty-five-year-old may be responsible for as many as 2.2B messages, authorities say
Feds Wrestle With Security Threats
News  |  2/20/2008  | 
In Black Hat DC keynote, current and former government officials discuss emerging Internet threats
Harvard Site Hacked, Posted to BitTorrent
News  |  2/19/2008  | 
Site is brought down, sensitive data posted on Web
Free Web Filtering Service Taps User Input
News  |  2/19/2008  | 
OpenDNS to launch new Web filtering service modeled after its PhishTank community site
Botnet Hunters Reveal New Spin on Old Tricks
News  |  2/15/2008  | 
Damballa researchers share some techniques for getting a better picture of botnets - and targeted attacks
Clinton Video Is Bait in Spam Scam
Quick Hits  |  2/15/2008  | 
Attackers play on recipients' interest in presidential campaign
Tech Insight: Analyze This Malware
News  |  2/15/2008  | 
When you want to know what it is and where it came from, you've got a range of choices
GFI Cuts Prices for SMBs up to 45%
News  |  2/14/2008  | 
Reductions reflect GFI's belief in providing quality solutions at unbeatable prices
Health Care Firms Increasingly Feeling 'the Love' as Targets of Attack
Quick Hits  |  2/14/2008  | 
Recent inside job by health care employee and increase in attempted hacks shine light on risks to patient data
Report: Zero-Days Are Now Attackers' Second Choice
News  |  2/13/2008  | 
Bad guys are increasingly exploiting known bugs, researchers say, but don't dismiss zero-days
Bell Canada Finds Stolen Data on 3.4M Customers
News  |  2/13/2008  | 
Suspect is arrested, but no one is sure how he got the data, telecom provider says
Do You Know What Your Kids Are Doing Online?
Quick Hits  |  2/13/2008  | 
Even parents who monitor their kids' activities may not know the whole story, study says
Arbor Networks Closes Ellacoya Buy
News  |  2/13/2008  | 
Arbor Networks completes acquisition of Ellacoya Networks
Webroot Extends Channel Program
News  |  2/13/2008  | 
Channel partners now have access to Webroot Email Security SaaS solutions to deliver multi-layered security approach
Cyberoam: Increased Valentine's Day Spam
News  |  2/13/2008  | 
Cyberoam warns emails with Valentine's Day-focused subject lines could be result of massive malware spam campaign
The Truth Behind Code Analysis
News  |  2/13/2008  | 
A true code review involves both scanning and architectural risk analysis
Palamida Joins McAfee Alliance
News  |  2/12/2008  | 
Relationship adds comprehensive open source vulnerability detection to ePolicy Orchestrator
Ten Myths About Identity Fraud
News  |  2/12/2008  | 
Think ID fraud is running amok over the Internet? Are online credit card thieves your worst fear? Here's a dose of reality that may change your mind
BreakingPoint Systems to Upgrade Metasploit-Inspired Tool
News  |  2/12/2008  | 
Version 1.2 of tool BPS-1000 adds direct attacks, support for more apps, and IPv6
FBI Alert: Valentine's Day E-Card Carries Storm
News  |  2/12/2008  | 
If you unexpectedly receive a Valentine's Day e-card, be careful
Weapons of Mass Redirection
News  |  2/12/2008  | 
Protecting your users from malicious DNS servers
BitDefender Offers Free Services
News  |  2/12/2008  | 
BitDefender announces free antivirus and antispyware online services
Klocwork Extends Java Source Code Analysis
News  |  2/12/2008  | 
Solution introduces more comprehensive analysis with greater accuracy while improving support for major Java frameworks and environments
Sophos: Russia Is Spam Superpower
News  |  2/11/2008  | 
Russia emerges as spam superpower, as Asia and Europe overtake North America
IBM Report: Vulnerabilities Decline for First Time in 10 Years
Quick Hits  |  2/11/2008  | 
But the number of high-severity vulnerablities increased by 28% last year, according to the new 2007 X-Force Security report
Keyloggers Aren't Viruses... Are They?
News  |  2/11/2008  | 
Keylogging shouldn't always be flagged as a virus
DNS Inventor Warns of Next Big Threat
News  |  2/11/2008  | 
It's just a matter of time before a big breach occurs from corrupted DNS resolution, says Paul Mockapetris
Hackers Turn Antivirus Site Into Virus Spreader
Quick Hits  |  2/11/2008  | 
AvSoft Technologies's SmartCOP site is hosting malicious code, researcher says
Surge in Male Enhancement Pill Spam in '07
News  |  2/11/2008  | 
Marshal traces a huge surge in sexual enhancement spam in 2007
SkyRecon Intros V5 of Endpoint Security Product
News  |  2/11/2008  | 
SkyRecon announces StormShield 5.0 unified endpoint security
Global Surge in Mobile Messaging Abuse to Come
News  |  2/11/2008  | 
Mobile operators brace for global surge in mobile messaging abuse
Second SaaS Is the Charm for Dairy Queen Franchisee
News  |  2/8/2008  | 
Initial security as a service solution crashed PCs at DQ, so franchisee found another SaaS
DLP-DAM Convergence: Duh!
News  |  2/8/2008  | 
A DAM solution that can't identify sensitive content should get cut from your short list
The Myth of the Risk Manager
News  |  2/8/2008  | 
Why the risk manager position is a dead-end job
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525
PUBLISHED: 2021-01-22
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.