Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in February 2008
<<   <   Page 2 / 2
Turkish Hackers Take Out Top Porn Site
Quick Hits  |  2/8/2008  | 
Operators of RedTube still not sure how attackers broke in
World's Youngest Hacker Is No Script Kiddie
Quick Hits  |  2/7/2008  | 
Once-bullied 16-year-old is now ready to go after cyberattackers - as a certified white hat hacker
The Coolest Hacks of 2007 - Part II
News  |  2/7/2008  | 
Just when you thought it was safe to go back online, we offer a new round of offbeat attacks that might make you think twice
Barracuda Rolls Out $10K Web App Gateway
News  |  2/7/2008  | 
Barracuda application gateway NC 500 AG offers robust Website application protection at an affordable price
Panda's Technology Praised by AV-Test.org
News  |  2/7/2008  | 
New AV-Test.org results show Panda Security's proactive and anti-rootkit technology effectiveness
Antivirus Inventor: Security Departments Are Wasting Their Time
News  |  2/6/2008  | 
About a third of current security practices are useless, according to ICSA chief scientist and Verizon exec
High-Tech Firms Fall Short on Security
Quick Hits  |  2/6/2008  | 
They might talk the security talk, but most tech companies are overconfident and underprepared, Deloitte study says
Grisoft Changes Name to AVG Technologies
News  |  2/6/2008  | 
Global change designed to increase AVG brand awareness
Internet Cleanup 5 for the Mac
News  |  2/6/2008  | 
Smith Micro Software's Internet Cleanup 5.0 provides greater protection from the latest Internet threats and enhanced privacy protection
Shavlik Upgrades NetChk Protect
News  |  2/6/2008  | 
Shavlik Technologies continues to close security and compliance gaps with latest release
Check Point Rolls Out NAC/Firewall/AV Tool
News  |  2/5/2008  | 
Check Point announces the first single agent for comprehensive endpoint security
nCircle Releases Web App Assessment Tool
News  |  2/5/2008  | 
nCircle unveils WebApp360, the industry's first enterprise-class Web application scanning solution suitable for production environments
New Authentication Scheme Combats Keyloggers, Shoulder-Hacking
News  |  2/5/2008  | 
Carnegie Mellon University researchers' prototype keeps attackers in the dark during authentication
The Hack Your Home Router Challenge
News  |  2/5/2008  | 
Hacker hosts hunt for home router bugs
Spam Botnet Lures With Explicit Videos
News  |  2/5/2008  | 
BitDefender detects spam botnet that lures users with explicit videos of Paris Hilton and Britney Spears
Agiliance Buys Compliance Firm
News  |  2/5/2008  | 
IT-GRC leader acquires Phulaxis, Inc. to solidify its strategic product roadmap; adds leading companies such as Linksys and Unifi to roster
FBI Warns of Email Scam
News  |  2/4/2008  | 
FBI identifies recurring fraudulent email scam
Too Much Access
News  |  2/4/2008  | 
New study shows that most companies still haven't solved the access governance problem - and their data may be at risk
Remote Workers Still Living Dangerously, Cisco Study Says
News  |  2/4/2008  | 
False sense of security leads many users to break company policies
Anti-Malware Vendors, Testers Form Consortium
Quick Hits  |  2/4/2008  | 
Anti-Malware Testing Standards Organization to build guidelines for benchmarking performance of antivirus apps and other tools
MayDay! Sneakier, More Powerful Botnet on the Loose
News  |  2/4/2008  | 
Peer-to-peer MayDay botnet is stealthier and more powerful than Storm, researchers say
2008 Election Candidates Vulnerable, Researcher Says
News  |  2/4/2008  | 
Campaign sites could fall victim to contribution theft, identity fraud, misinformation, or denial of service
Fortinet Has Shipped Over 300K Appliances
News  |  2/4/2008  | 
Customer demand for Fortinet's consolidated network security solutions fuels growth and milestone achievements
St. Bernard Launches Appliances
News  |  2/4/2008  | 
St. Bernard launches family of powerful hybrid-ready appliances; hardware offers 200% performance increase
Veracode Adds Backdoor Detection
News  |  2/4/2008  | 
Veracode shines spotlight on software backdoors as emerging threat
Symantec Goes Virtual With Defense
News  |  2/4/2008  | 
Symantec rolls out virtual edition of Symantec Mail Security 8300 appliance
Finding Bugs and Counting Votes
News  |  2/1/2008  | 
Fortify Software offers states free copies of its source code analysis tool to check e-voting systems, but some bugs could still slip by
Employee Pulls Plug on Digital Bank Robbery
Quick Hits  |  2/1/2008  | 
Online transfer would have sucked "millions" from the bank's vaults; thieves are arrested
Email Authentication Reaches 'Tipping Point'
News  |  2/1/2008  | 
Authentication and Online Trust Alliance report says 55 percent of emails are authenticated
Tech Insight: The Buzz Around Fuzzing
News  |  2/1/2008  | 
Fuzzing tools can help identify vulnerabilities before the bad guys do
<<   <   Page 2 / 2

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-14
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could allow unauthorized access to the driver's device object.
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could cause systems to experience a blue screen error.