Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in February 2008
<<   <   Page 2 / 2
Turkish Hackers Take Out Top Porn Site
Quick Hits  |  2/8/2008  | 
Operators of RedTube still not sure how attackers broke in
World's Youngest Hacker Is No Script Kiddie
Quick Hits  |  2/7/2008  | 
Once-bullied 16-year-old is now ready to go after cyberattackers - as a certified white hat hacker
The Coolest Hacks of 2007 - Part II
News  |  2/7/2008  | 
Just when you thought it was safe to go back online, we offer a new round of offbeat attacks that might make you think twice
Barracuda Rolls Out $10K Web App Gateway
News  |  2/7/2008  | 
Barracuda application gateway NC 500 AG offers robust Website application protection at an affordable price
Panda's Technology Praised by AV-Test.org
News  |  2/7/2008  | 
New AV-Test.org results show Panda Security's proactive and anti-rootkit technology effectiveness
Antivirus Inventor: Security Departments Are Wasting Their Time
News  |  2/6/2008  | 
About a third of current security practices are useless, according to ICSA chief scientist and Verizon exec
High-Tech Firms Fall Short on Security
Quick Hits  |  2/6/2008  | 
They might talk the security talk, but most tech companies are overconfident and underprepared, Deloitte study says
Grisoft Changes Name to AVG Technologies
News  |  2/6/2008  | 
Global change designed to increase AVG brand awareness
Internet Cleanup 5 for the Mac
News  |  2/6/2008  | 
Smith Micro Software's Internet Cleanup 5.0 provides greater protection from the latest Internet threats and enhanced privacy protection
Shavlik Upgrades NetChk Protect
News  |  2/6/2008  | 
Shavlik Technologies continues to close security and compliance gaps with latest release
Check Point Rolls Out NAC/Firewall/AV Tool
News  |  2/5/2008  | 
Check Point announces the first single agent for comprehensive endpoint security
nCircle Releases Web App Assessment Tool
News  |  2/5/2008  | 
nCircle unveils WebApp360, the industry's first enterprise-class Web application scanning solution suitable for production environments
New Authentication Scheme Combats Keyloggers, Shoulder-Hacking
News  |  2/5/2008  | 
Carnegie Mellon University researchers' prototype keeps attackers in the dark during authentication
The Hack Your Home Router Challenge
News  |  2/5/2008  | 
Hacker hosts hunt for home router bugs
Spam Botnet Lures With Explicit Videos
News  |  2/5/2008  | 
BitDefender detects spam botnet that lures users with explicit videos of Paris Hilton and Britney Spears
Agiliance Buys Compliance Firm
News  |  2/5/2008  | 
IT-GRC leader acquires Phulaxis, Inc. to solidify its strategic product roadmap; adds leading companies such as Linksys and Unifi to roster
FBI Warns of Email Scam
News  |  2/4/2008  | 
FBI identifies recurring fraudulent email scam
Too Much Access
News  |  2/4/2008  | 
New study shows that most companies still haven't solved the access governance problem - and their data may be at risk
Remote Workers Still Living Dangerously, Cisco Study Says
News  |  2/4/2008  | 
False sense of security leads many users to break company policies
Anti-Malware Vendors, Testers Form Consortium
Quick Hits  |  2/4/2008  | 
Anti-Malware Testing Standards Organization to build guidelines for benchmarking performance of antivirus apps and other tools
MayDay! Sneakier, More Powerful Botnet on the Loose
News  |  2/4/2008  | 
Peer-to-peer MayDay botnet is stealthier and more powerful than Storm, researchers say
2008 Election Candidates Vulnerable, Researcher Says
News  |  2/4/2008  | 
Campaign sites could fall victim to contribution theft, identity fraud, misinformation, or denial of service
Fortinet Has Shipped Over 300K Appliances
News  |  2/4/2008  | 
Customer demand for Fortinet's consolidated network security solutions fuels growth and milestone achievements
St. Bernard Launches Appliances
News  |  2/4/2008  | 
St. Bernard launches family of powerful hybrid-ready appliances; hardware offers 200% performance increase
Veracode Adds Backdoor Detection
News  |  2/4/2008  | 
Veracode shines spotlight on software backdoors as emerging threat
Symantec Goes Virtual With Defense
News  |  2/4/2008  | 
Symantec rolls out virtual edition of Symantec Mail Security 8300 appliance
Finding Bugs and Counting Votes
News  |  2/1/2008  | 
Fortify Software offers states free copies of its source code analysis tool to check e-voting systems, but some bugs could still slip by
Employee Pulls Plug on Digital Bank Robbery
Quick Hits  |  2/1/2008  | 
Online transfer would have sucked "millions" from the bank's vaults; thieves are arrested
Email Authentication Reaches 'Tipping Point'
News  |  2/1/2008  | 
Authentication and Online Trust Alliance report says 55 percent of emails are authenticated
Tech Insight: The Buzz Around Fuzzing
News  |  2/1/2008  | 
Fuzzing tools can help identify vulnerabilities before the bad guys do
<<   <   Page 2 / 2

Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: "The truth behind Stonehenge...."
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-02
Blackboard Collaborate Ultra 20.02 is affected by a cross-site scripting (XSS) vulnerability. The XSS payload will execute on the class room, which leads to stealing cookies from users who join the class.
PUBLISHED: 2021-03-02
A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4.
PUBLISHED: 2021-03-02
An issue was discovered in app/Model/SharingGroupServer.php in MISP 2.4.139. In the implementation of Sharing Groups, the &quot;all org&quot; flag sometimes provided view access to unintended actors.
PUBLISHED: 2021-03-02
An issue was discovered on LG mobile devices with Android OS 11 software. They mishandle fingerprint recognition because local high beam mode (LHBM) does not function properly during bright illumination. The LG ID is LVE-SMP-210001 (March 2021).
PUBLISHED: 2021-03-02
fastify-reply-from is an npm package which is a fastify plugin to forward the current http request to another server. In fastify-reply-from before version 4.0.2, by crafting a specific URL, it is possible to escape the prefix of the proxied backend service. If the base url of the proxied server is &...