Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in February 2008
<<   <   Page 2 / 2
Turkish Hackers Take Out Top Porn Site
Quick Hits  |  2/8/2008  | 
Operators of RedTube still not sure how attackers broke in
World's Youngest Hacker Is No Script Kiddie
Quick Hits  |  2/7/2008  | 
Once-bullied 16-year-old is now ready to go after cyberattackers - as a certified white hat hacker
The Coolest Hacks of 2007 - Part II
News  |  2/7/2008  | 
Just when you thought it was safe to go back online, we offer a new round of offbeat attacks that might make you think twice
Barracuda Rolls Out $10K Web App Gateway
News  |  2/7/2008  | 
Barracuda application gateway NC 500 AG offers robust Website application protection at an affordable price
Panda's Technology Praised by AV-Test.org
News  |  2/7/2008  | 
New AV-Test.org results show Panda Security's proactive and anti-rootkit technology effectiveness
Antivirus Inventor: Security Departments Are Wasting Their Time
News  |  2/6/2008  | 
About a third of current security practices are useless, according to ICSA chief scientist and Verizon exec
High-Tech Firms Fall Short on Security
Quick Hits  |  2/6/2008  | 
They might talk the security talk, but most tech companies are overconfident and underprepared, Deloitte study says
Grisoft Changes Name to AVG Technologies
News  |  2/6/2008  | 
Global change designed to increase AVG brand awareness
Internet Cleanup 5 for the Mac
News  |  2/6/2008  | 
Smith Micro Software's Internet Cleanup 5.0 provides greater protection from the latest Internet threats and enhanced privacy protection
Shavlik Upgrades NetChk Protect
News  |  2/6/2008  | 
Shavlik Technologies continues to close security and compliance gaps with latest release
Check Point Rolls Out NAC/Firewall/AV Tool
News  |  2/5/2008  | 
Check Point announces the first single agent for comprehensive endpoint security
nCircle Releases Web App Assessment Tool
News  |  2/5/2008  | 
nCircle unveils WebApp360, the industry's first enterprise-class Web application scanning solution suitable for production environments
New Authentication Scheme Combats Keyloggers, Shoulder-Hacking
News  |  2/5/2008  | 
Carnegie Mellon University researchers' prototype keeps attackers in the dark during authentication
The Hack Your Home Router Challenge
News  |  2/5/2008  | 
Hacker hosts hunt for home router bugs
Spam Botnet Lures With Explicit Videos
News  |  2/5/2008  | 
BitDefender detects spam botnet that lures users with explicit videos of Paris Hilton and Britney Spears
Agiliance Buys Compliance Firm
News  |  2/5/2008  | 
IT-GRC leader acquires Phulaxis, Inc. to solidify its strategic product roadmap; adds leading companies such as Linksys and Unifi to roster
FBI Warns of Email Scam
News  |  2/4/2008  | 
FBI identifies recurring fraudulent email scam
Too Much Access
News  |  2/4/2008  | 
New study shows that most companies still haven't solved the access governance problem - and their data may be at risk
Remote Workers Still Living Dangerously, Cisco Study Says
News  |  2/4/2008  | 
False sense of security leads many users to break company policies
Anti-Malware Vendors, Testers Form Consortium
Quick Hits  |  2/4/2008  | 
Anti-Malware Testing Standards Organization to build guidelines for benchmarking performance of antivirus apps and other tools
MayDay! Sneakier, More Powerful Botnet on the Loose
News  |  2/4/2008  | 
Peer-to-peer MayDay botnet is stealthier and more powerful than Storm, researchers say
2008 Election Candidates Vulnerable, Researcher Says
News  |  2/4/2008  | 
Campaign sites could fall victim to contribution theft, identity fraud, misinformation, or denial of service
Fortinet Has Shipped Over 300K Appliances
News  |  2/4/2008  | 
Customer demand for Fortinet's consolidated network security solutions fuels growth and milestone achievements
St. Bernard Launches Appliances
News  |  2/4/2008  | 
St. Bernard launches family of powerful hybrid-ready appliances; hardware offers 200% performance increase
Veracode Adds Backdoor Detection
News  |  2/4/2008  | 
Veracode shines spotlight on software backdoors as emerging threat
Symantec Goes Virtual With Defense
News  |  2/4/2008  | 
Symantec rolls out virtual edition of Symantec Mail Security 8300 appliance
Finding Bugs and Counting Votes
News  |  2/1/2008  | 
Fortify Software offers states free copies of its source code analysis tool to check e-voting systems, but some bugs could still slip by
Employee Pulls Plug on Digital Bank Robbery
Quick Hits  |  2/1/2008  | 
Online transfer would have sucked "millions" from the bank's vaults; thieves are arrested
Email Authentication Reaches 'Tipping Point'
News  |  2/1/2008  | 
Authentication and Online Trust Alliance report says 55 percent of emails are authenticated
Tech Insight: The Buzz Around Fuzzing
News  |  2/1/2008  | 
Fuzzing tools can help identify vulnerabilities before the bad guys do
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27974
PUBLISHED: 2020-10-28
NeoPost Mail Accounting Software Pro 5.0.6 allows php/Commun/FUS_SCM_BlockStart.php?code= XSS.
CVE-2020-27975
PUBLISHED: 2020-10-28
osCommerce Phoenix CE before 1.0.5.4 allows admin/define_language.php CSRF.
CVE-2020-27976
PUBLISHED: 2020-10-28
osCommerce Phoenix CE before 1.0.5.4 allows OS command injection remotely. Within admin/mail.php, a from POST parameter can be passed to the application. This affects the PHP mail function, and the sendmail -f option.
CVE-2020-27978
PUBLISHED: 2020-10-28
Shibboleth Identify Provider 3.x before 3.4.6 has a denial of service flaw. A remote unauthenticated attacker can cause a login flow to trigger Java heap exhaustion due to the creation of objects in the Java Servlet container session.
CVE-2020-22552
PUBLISHED: 2020-10-28
The Snap7 server component in version 1.4.1, when an attacker sends a crafted packet with COTP protocol the last-data-unit flag set to No and S7 writes a var function, the Snap7 server will be crashed.