Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in April 2007
Page 1 / 2   >   >>
DNS Center Resource Launches
News  |  4/30/2007  | 
DNSstuff.com unveils DNS resource center; announces content partnership with Infoblox
DOS Gets Political in Estonia
News  |  4/30/2007  | 
Online attacks disable government sites as riots and arrests roil former Soviet republic
MarkMonitor Releases Index
News  |  4/30/2007  | 
MarkMonitor released the company's first Brandjacking Index, a quarterly report that measures the effect of online threats to brands
Websense to Buy SurfControl
News  |  4/27/2007  | 
$400 million deal will merge two top end-user monitoring tools
Disk-o Inferno
News  |  4/27/2007  | 
As portable devices multiply, maybe it's time to secure the data instead of the device
Google AdWords Attack Video
News  |  4/27/2007  | 
Exploit Prevention Labs released a video documenting how cyber criminals are using Google's AdWords to infect unsuspecting users with malware
Telcos at Risk of Web Bugs
News  |  4/27/2007  | 
Service providers face security learning curve as they roll out next-generation Web services
What Imus Can Teach IT
News  |  4/27/2007  | 
Shock jock's implosion illustrates several lessons about the prevention and containment of data breaches
Experts: US Not Prepared for Cyber Attack
News  |  4/26/2007  | 
Multi-billion-dollar investment recommended to mitigate threats
Rutkowska Launches Own Startup
News  |  4/26/2007  | 
Famed hacker's company to demo new Vista hacks, other stealth malware attacks at Black Hat USA
GFI Launches Storage Device Scanner
News  |  4/26/2007  | 
GFI launches free, online portable storage device scanner
Microsoft's Happy Bugfinder
News  |  4/25/2007  | 
Michael Howard chats up Vista security, rugby, and working with Bill Gates
Dial '72-Duh'
News  |  4/24/2007  | 
Stupid phishing tricks 101: This new scam is a little too forward
Startup on Search and Destroy Mission
News  |  4/24/2007  | 
Robot Genius to team with ISPs, search-engine, and firewall vendors to find Web-borne malware in real-time
Exploit Prevention Labs Reports Results
News  |  4/24/2007  | 
Exploit Prevention Labs: Chinese hackers take over the number one slot, ANI exploit hits hard in final days of March
Webroot Announces Most Common Threats
News  |  4/24/2007  | 
Webroot Software announces the most common forms of malicious security threats in the UK, at InfoSecurity Europe 2007
Sophos Reveals Rise of Malware
News  |  4/24/2007  | 
Sophos announced the results of its research into worldwide cybercrime activity during the first three months of 2007
Re-Thinking PCI
News  |  4/24/2007  | 
The Payment Card Industry standard wasn't just designed for banks - it's also intended to protect consumers
Mu Security Discovers Vulnerability
News  |  4/23/2007  | 
Mu Security has discovered and provided details to remediate a pre-authentication vulnerability in the Mac OS X RPC runtime library
Sweetening the Honeypot
News  |  4/23/2007  | 
Experts disagree whether free tools will make honeynets more practical for enterprise IT deployment
Barclays Bank Selects Shavlik
News  |  4/23/2007  | 
Shavlik, Satisnet team to fill need for fast and accurate patch status and configuration policy enforcement for global banking leader
Miami-Dade Selects Sophos
News  |  4/23/2007  | 
Miami-Dade Public Schools has selected Sophos to protect 90,000 desktops and 50,000 email accounts
Concentric Reduces Email Load, Spam
News  |  4/23/2007  | 
Concentric announced the expansion of the company's messaging, collaboration, DNS, and hosting services with PEP
USBs' Giant Sucking Sound
News  |  4/20/2007  | 
Most organizations house critical data on laptops, USB thumb drives, and iPods, new survey says
Want Turns to Need
News  |  4/20/2007  | 
Software security is no longer an emerging discipline, and here's why enterprises should care
Ranking Bugs, Saving Pigs
News  |  4/19/2007  | 
The man behind the SANS Top 20, Rohit Dhamankar, calls out bugs - and animal rights
DNS Flaw Creates Botnet Threat
News  |  4/19/2007  | 
FireEye announced that its FireEye Attack Confirmation Technology (FACT) stops botnets exploiting a zero-day flaw in Microsoft's DNS server
Aliens, Protein, and Bots
News  |  4/19/2007  | 
Today's grids may be tomorrow's botnets
Security, Post-Va. Tech
News  |  4/19/2007  | 
It's time to address two common mistakes made in responding to these kinds of disasters
Targeted Attacks on the Rise
News  |  4/18/2007  | 
Most attacks target a single user, report says
Criminals Try to Capitalize on Tragedy
News  |  4/18/2007  | 
Sophos warns individuals of a social engineering phishing campaign that attempts to capitalize on the tragedy at Virginia Tech
Botnets Battle Over Turf
News  |  4/18/2007  | 
Some botnets even patch their infected machines to prevent other botnets from hijacking them
MarkMonitor Helps Bank Foil Phishers
News  |  4/18/2007  | 
Nationwide has successfully deployed Antiphishing Solutions from MarkMonitor to automatically identify and shut down phishing scams
Barracuda Profiles Spammers
News  |  4/18/2007  | 
Barracuda Networks announced the Predictive Sender Profiling capabilities of the Barracuda Spam Firewall
Centennial Warns Users to Fix Bugs
News  |  4/18/2007  | 
Centennial warned Windows users not to underestimate the importance of deploying the latest fixes across their entire Windows PC estate
Because That's Where the Money Is
News  |  4/18/2007  | 
Just like banks, corporate content filters can provide the bad guys with valuable things to steal
Experts: DNS Attacks Could Go Deeper
News  |  4/17/2007  | 
DNS botnet exploits are bad, but potential for an attacker to 'own' your DNS server is much worse
Applicure Monitors, IDs Web Attacks
News  |  4/17/2007  | 
Applicure Technologies launches the first software tool to alert in real time upon any attempt to attack the Web server
I Am Not Angry, Dammit!
News  |  4/17/2007  | 
'Emotion detection' means the cranky wheel will always get the oil
Fortinet Finds Akamai Vulnerability
News  |  4/17/2007  | 
Remote buffer overflow vulnerability could allow attackers to control victims' systems
Retailers Still Lag in PCI Compliance
News  |  4/17/2007  | 
Despite recent data breaches, more than half still have not implemented guidelines for protecting credit card data
Agnitum Pre-Releases Security Suite
News  |  4/17/2007  | 
Agnitum delivered the final pre-release version of the company's Outpost Security Suite Pro
Hostopia Goes Arbor
News  |  4/17/2007  | 
Hostopia.com has selected Arbor Peakflow SP to protect their network against a wide range of security threats
SCADA State of Denial
News  |  4/16/2007  | 
More bugs and security tools for process control industry - but it's more a mindset than a technology problem
Loan Companies Abusing Student Database
News  |  4/16/2007  | 
Financial companies accused of unauthorized mining of National Student Loan Data System
SPI Details Web App Hacking
News  |  4/16/2007  | 
SPI Dynamics will lead five presentations throughout the week of April 16 at the Software Security Summit and STPCon
Electoral Subtext
News  |  4/16/2007  | 
Whether you're monitoring the voting process or the status of your most valued server, you better have a Plan B
Watchfire Adds Vulnerability Tester
News  |  4/16/2007  | 
Watchfire introduced the industry's most flexible web application security solution, Watchfire AppScan 7.5
Zero-Day Fever
News  |  4/13/2007  | 
Latest zero-day attack hits Microsoft DNS servers, may be abused by botnet operators
Study: Browser Warnings Don't Work
News  |  4/13/2007  | 
Despite lock-and-key icons and pop-up alerts, banking users just keep on loggin' on, Harvard/MIT researchers say
Page 1 / 2   >   >>

Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.