Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in April 2007
<<   <   Page 2 / 2
That Air of Danger
News  |  4/13/2007  | 
Security researchers, attackers turn their attention to mobile and wireless vulnerabilities
IRS Warns of New Tax Scam
News  |  4/13/2007  | 
Late tax scam discovered; free file users reminded to use IRS.gov
10 Hot Security Startups
News  |  4/12/2007  | 
Want to know who's on the cutting edge of security technology? Take a look at these 10 newcomers
Feds Under Fire Over Security
News  |  4/12/2007  | 
Agencies get C- on security report card; FTC criticized for low number of spam, spyware convictions
Top Layer Rolls Out New IPS
News  |  4/12/2007  | 
Top Layer Networks announced immediate availability of the latest version of its flagship IPS 5500 intrusion prevention solution
No Starch Announces Book Release
News  |  4/11/2007  | 
New book on designing BSD rootkits
Fiberlink Launches Mobile NAC
News  |  4/11/2007  | 
Fiberlink introduces the first NAC solution designed specifically for the mobile workforce
Mobile Phones: Hackers' Next Target
News  |  4/11/2007  | 
Attackers find fertile ground as wireless devices increase in both popularity and vulnerability
Sophos Unveils 'Dirty Dozen'
News  |  4/11/2007  | 
Sophos has published its latest report on the top 12 spam relaying countries during the first quarter of 2007
Retailers, FBI Launch Crime Database
News  |  4/10/2007  | 
National repository will let stores, law enforcement agencies share information about retail crimes
Critical WiFi Bug Found on Linux
News  |  4/10/2007  | 
France Telecom researcher demo'd device driver bug in MadWiFi Linux kernel
Your Own Users? Hacking?
News  |  4/10/2007  | 
Say it isn't so... But the only way to know for sure is by monitoring their HTTP traffic (a.k.a. spying)
Arxceo Turns Table at Conference
News  |  4/10/2007  | 
Arxceo's anti-reconnaissance security appliance turns the table on cyber specialists at engineering conference
GRISOFT Intros Free AVG Anti-Rootkit
News  |  4/10/2007  | 
GRISOFT, the developer of AVG Internet security software, introduced a new, free product aimed at detection and removal of Rootkits
PCI Won't Save You
News  |  4/9/2007  | 
You need more than standards and legal requirements to detect and prevent data leakage
Researchers Put Nail in WEP's Coffin
News  |  4/9/2007  | 
Already-weak encryption protocol now can be cracked in three seconds
RFID Under Attack Again
News  |  4/9/2007  | 
RFID hacking isn't rocket science, but the risk depends on proper use, deployment
Glued to Security
News  |  4/9/2007  | 
Bet your security strategy doesn't account for this exploit
Sophos Launches New Strategy
News  |  4/9/2007  | 
Sophos announced the launch of its 100 percent channel sales strategy in North America
Promisec Supports Vista
News  |  4/9/2007  | 
Promisec announced enhancements to its award-winning Promisec Spectator Professional software
Jack of All Security Trades
News  |  4/6/2007  | 
To manage security, you also need to know people, math, and how to take out the garbage
Whirlpool Spins New Address Scheme
News  |  4/6/2007  | 
New DNS address management tools help appliance maker wash away previous security woes
Solving IPTV's Security Problem
News  |  4/5/2007  | 
Vendors wrestle to protect emerging services from attacks - without driving cost-conscious customers away
Kaspersky Finds First iPod Virus
News  |  4/5/2007  | 
Kaspersky Lab discovered the first virus designed to infect iPod portable media players
Hacking Bluetooth With a USB Stick
News  |  4/5/2007  | 
European researchers have built a Bluetooth sniffer on a $30 USB dongle
Laptop Lockdown
News  |  4/5/2007  | 
Mobility means exposure to theft, loss, and infection, but you can reduce the risks
Audit Uncovers IRS Security Flaws
News  |  4/4/2007  | 
Tax agency not doing enough to protect taxpayer data on laptops, PCs, according to Treasury report
Read This, Or I'll Kill You
News  |  4/4/2007  | 
Or, how the rising tide of threats made online creates big-time legal exposure for users' employers
MessageLabs Reports on Sinister Activity
News  |  4/3/2007  | 
MessageLabs announced the results of its MessageLabs Intelligence Report for March 2007
Microsoft's 'Stepto' Gets Into the Game
News  |  4/3/2007  | 
Microsoft security star Stephen Toulouse talks researchers and Microsofties, cooking, and golden retrievers
Garbage Out, Cops In
News  |  4/3/2007  | 
Texas Attorney General throws the book at companies that don't properly throw it away
Malware & Attacker, Exposed
News  |  4/3/2007  | 
New research will show how to decode malware hidden with JavaScript
eEye's Two Releases
News  |  4/3/2007  | 
Ross Brown says his removal as CEO of eEye Digital Security was no surprise
March's Email Madness
News  |  4/3/2007  | 
NCAA tournament pools raise level of email traffic - and managers' blood pressure
A Hack With Teeth
News  |  4/2/2007  | 
Cross-site scripting can hit any Web app - from your dentist's Internet kiosk to your bank ATM
Dude, Where's Your PC?
News  |  4/2/2007  | 
Audit exposes lost computers at counterintelligence agency, need for better inventory management
Arbor Enhances Peakflow X 3.7
News  |  4/2/2007  | 
Arbor Networks announced a new version of its enterprise solution, Arbor Peakflow X 3.7
Kaspersky Lab Releases KOSS
News  |  4/2/2007  | 
Kaspersky Lab announced the availability of Kaspersky Open Space Security
Fortify Documents Vulnerability in Web 2.0
News  |  4/2/2007  | 
Fortify's Security Research Group has documented a major vulnerability associated specifically with Web 2.0 and Ajax-style software
Security App Protects Against Windows Attack
News  |  4/2/2007  | 
eEye's Blink Personal stops Windows zero-day attack that's building around the Internet
Sophos Announces Top 10 Threats
News  |  4/2/2007  | 
Sophos has revealed the most prevalent malware threats causing problems for computer users around the world during March 2007
No Starch Press Publishes Guide
News  |  4/2/2007  | 
Webbots, Spiders, and Screen Scrapers - new from No Starch Press
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16168
PUBLISHED: 2020-08-07
Temi firmware 20190419.165201 does not properly verify that the source of data or communication is valid, aka an Origin Validation Error.
CVE-2020-8025
PUBLISHED: 2020-08-07
A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the p...
CVE-2020-8026
PUBLISHED: 2020-08-07
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior...
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.