Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in April 2007
Page 1 / 2   >   >>
DNS Center Resource Launches
News  |  4/30/2007  | 
DNSstuff.com unveils DNS resource center; announces content partnership with Infoblox
DOS Gets Political in Estonia
News  |  4/30/2007  | 
Online attacks disable government sites as riots and arrests roil former Soviet republic
MarkMonitor Releases Index
News  |  4/30/2007  | 
MarkMonitor released the company's first Brandjacking Index, a quarterly report that measures the effect of online threats to brands
Websense to Buy SurfControl
News  |  4/27/2007  | 
$400 million deal will merge two top end-user monitoring tools
Disk-o Inferno
News  |  4/27/2007  | 
As portable devices multiply, maybe it's time to secure the data instead of the device
Google AdWords Attack Video
News  |  4/27/2007  | 
Exploit Prevention Labs released a video documenting how cyber criminals are using Google's AdWords to infect unsuspecting users with malware
Telcos at Risk of Web Bugs
News  |  4/27/2007  | 
Service providers face security learning curve as they roll out next-generation Web services
What Imus Can Teach IT
News  |  4/27/2007  | 
Shock jock's implosion illustrates several lessons about the prevention and containment of data breaches
Experts: US Not Prepared for Cyber Attack
News  |  4/26/2007  | 
Multi-billion-dollar investment recommended to mitigate threats
Rutkowska Launches Own Startup
News  |  4/26/2007  | 
Famed hacker's company to demo new Vista hacks, other stealth malware attacks at Black Hat USA
GFI Launches Storage Device Scanner
News  |  4/26/2007  | 
GFI launches free, online portable storage device scanner
Microsoft's Happy Bugfinder
News  |  4/25/2007  | 
Michael Howard chats up Vista security, rugby, and working with Bill Gates
Dial '72-Duh'
News  |  4/24/2007  | 
Stupid phishing tricks 101: This new scam is a little too forward
Startup on Search and Destroy Mission
News  |  4/24/2007  | 
Robot Genius to team with ISPs, search-engine, and firewall vendors to find Web-borne malware in real-time
Exploit Prevention Labs Reports Results
News  |  4/24/2007  | 
Exploit Prevention Labs: Chinese hackers take over the number one slot, ANI exploit hits hard in final days of March
Webroot Announces Most Common Threats
News  |  4/24/2007  | 
Webroot Software announces the most common forms of malicious security threats in the UK, at InfoSecurity Europe 2007
Sophos Reveals Rise of Malware
News  |  4/24/2007  | 
Sophos announced the results of its research into worldwide cybercrime activity during the first three months of 2007
Re-Thinking PCI
News  |  4/24/2007  | 
The Payment Card Industry standard wasn't just designed for banks - it's also intended to protect consumers
Mu Security Discovers Vulnerability
News  |  4/23/2007  | 
Mu Security has discovered and provided details to remediate a pre-authentication vulnerability in the Mac OS X RPC runtime library
Sweetening the Honeypot
News  |  4/23/2007  | 
Experts disagree whether free tools will make honeynets more practical for enterprise IT deployment
Barclays Bank Selects Shavlik
News  |  4/23/2007  | 
Shavlik, Satisnet team to fill need for fast and accurate patch status and configuration policy enforcement for global banking leader
Miami-Dade Selects Sophos
News  |  4/23/2007  | 
Miami-Dade Public Schools has selected Sophos to protect 90,000 desktops and 50,000 email accounts
Concentric Reduces Email Load, Spam
News  |  4/23/2007  | 
Concentric announced the expansion of the company's messaging, collaboration, DNS, and hosting services with PEP
USBs' Giant Sucking Sound
News  |  4/20/2007  | 
Most organizations house critical data on laptops, USB thumb drives, and iPods, new survey says
Want Turns to Need
News  |  4/20/2007  | 
Software security is no longer an emerging discipline, and here's why enterprises should care
Ranking Bugs, Saving Pigs
News  |  4/19/2007  | 
The man behind the SANS Top 20, Rohit Dhamankar, calls out bugs - and animal rights
DNS Flaw Creates Botnet Threat
News  |  4/19/2007  | 
FireEye announced that its FireEye Attack Confirmation Technology (FACT) stops botnets exploiting a zero-day flaw in Microsoft's DNS server
Aliens, Protein, and Bots
News  |  4/19/2007  | 
Today's grids may be tomorrow's botnets
Security, Post-Va. Tech
News  |  4/19/2007  | 
It's time to address two common mistakes made in responding to these kinds of disasters
Targeted Attacks on the Rise
News  |  4/18/2007  | 
Most attacks target a single user, report says
Criminals Try to Capitalize on Tragedy
News  |  4/18/2007  | 
Sophos warns individuals of a social engineering phishing campaign that attempts to capitalize on the tragedy at Virginia Tech
Botnets Battle Over Turf
News  |  4/18/2007  | 
Some botnets even patch their infected machines to prevent other botnets from hijacking them
MarkMonitor Helps Bank Foil Phishers
News  |  4/18/2007  | 
Nationwide has successfully deployed Antiphishing Solutions from MarkMonitor to automatically identify and shut down phishing scams
Barracuda Profiles Spammers
News  |  4/18/2007  | 
Barracuda Networks announced the Predictive Sender Profiling capabilities of the Barracuda Spam Firewall
Centennial Warns Users to Fix Bugs
News  |  4/18/2007  | 
Centennial warned Windows users not to underestimate the importance of deploying the latest fixes across their entire Windows PC estate
Because That's Where the Money Is
News  |  4/18/2007  | 
Just like banks, corporate content filters can provide the bad guys with valuable things to steal
Experts: DNS Attacks Could Go Deeper
News  |  4/17/2007  | 
DNS botnet exploits are bad, but potential for an attacker to 'own' your DNS server is much worse
Applicure Monitors, IDs Web Attacks
News  |  4/17/2007  | 
Applicure Technologies launches the first software tool to alert in real time upon any attempt to attack the Web server
I Am Not Angry, Dammit!
News  |  4/17/2007  | 
'Emotion detection' means the cranky wheel will always get the oil
Fortinet Finds Akamai Vulnerability
News  |  4/17/2007  | 
Remote buffer overflow vulnerability could allow attackers to control victims' systems
Retailers Still Lag in PCI Compliance
News  |  4/17/2007  | 
Despite recent data breaches, more than half still have not implemented guidelines for protecting credit card data
Agnitum Pre-Releases Security Suite
News  |  4/17/2007  | 
Agnitum delivered the final pre-release version of the company's Outpost Security Suite Pro
Hostopia Goes Arbor
News  |  4/17/2007  | 
Hostopia.com has selected Arbor Peakflow SP to protect their network against a wide range of security threats
SCADA State of Denial
News  |  4/16/2007  | 
More bugs and security tools for process control industry - but it's more a mindset than a technology problem
Loan Companies Abusing Student Database
News  |  4/16/2007  | 
Financial companies accused of unauthorized mining of National Student Loan Data System
SPI Details Web App Hacking
News  |  4/16/2007  | 
SPI Dynamics will lead five presentations throughout the week of April 16 at the Software Security Summit and STPCon
Electoral Subtext
News  |  4/16/2007  | 
Whether you're monitoring the voting process or the status of your most valued server, you better have a Plan B
Watchfire Adds Vulnerability Tester
News  |  4/16/2007  | 
Watchfire introduced the industry's most flexible web application security solution, Watchfire AppScan 7.5
Zero-Day Fever
News  |  4/13/2007  | 
Latest zero-day attack hits Microsoft DNS servers, may be abused by botnet operators
Study: Browser Warnings Don't Work
News  |  4/13/2007  | 
Despite lock-and-key icons and pop-up alerts, banking users just keep on loggin' on, Harvard/MIT researchers say
Page 1 / 2   >   >>


I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
6 Top Nontechnical Degrees for Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/21/2019
Anatomy of a BEC Scam
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3654
PUBLISHED: 2019-11-22
Authentication Bypass vulnerability in the Microsoft Windows client in McAfee Client Proxy (MCP) prior to 3.0.0 allows local user to bypass scanning of web traffic and gain access to blocked sites for a short period of time via generating an authorization key on the client which should only be gener...
CVE-2014-2214
PUBLISHED: 2019-11-22
Multiple cross-site scripting (XSS) vulnerabilities in POSH (aka Posh portal or Portaneo) 3.0 through 3.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) error parameter to /includes/plugins/mobile/scripts/login.php or (2) id parameter to portal/openrssarticle.php
CVE-2014-6310
PUBLISHED: 2019-11-22
Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function.
CVE-2014-6311
PUBLISHED: 2019-11-22
generate_doygen.pl in ace before 6.2.7+dfsg-2 creates predictable file names in the /tmp directory which allows attackers to gain elevated privileges.
CVE-2019-16763
PUBLISHED: 2019-11-22
In Pannellum from 2.5.0 through 2.5.4 URLs were not sanitized for data URIs (or vbscript:), allowing for potential XSS attacks. Such an attack would require a user to click on a hot spot to execute and would require an attacker-provided configuration. The most plausible potential attack would be if ...