Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in April 2007
<<   <   Page 2 / 2
That Air of Danger
News  |  4/13/2007  | 
Security researchers, attackers turn their attention to mobile and wireless vulnerabilities
IRS Warns of New Tax Scam
News  |  4/13/2007  | 
Late tax scam discovered; free file users reminded to use IRS.gov
10 Hot Security Startups
News  |  4/12/2007  | 
Want to know who's on the cutting edge of security technology? Take a look at these 10 newcomers
Feds Under Fire Over Security
News  |  4/12/2007  | 
Agencies get C- on security report card; FTC criticized for low number of spam, spyware convictions
Top Layer Rolls Out New IPS
News  |  4/12/2007  | 
Top Layer Networks announced immediate availability of the latest version of its flagship IPS 5500 intrusion prevention solution
No Starch Announces Book Release
News  |  4/11/2007  | 
New book on designing BSD rootkits
Fiberlink Launches Mobile NAC
News  |  4/11/2007  | 
Fiberlink introduces the first NAC solution designed specifically for the mobile workforce
Mobile Phones: Hackers' Next Target
News  |  4/11/2007  | 
Attackers find fertile ground as wireless devices increase in both popularity and vulnerability
Sophos Unveils 'Dirty Dozen'
News  |  4/11/2007  | 
Sophos has published its latest report on the top 12 spam relaying countries during the first quarter of 2007
Retailers, FBI Launch Crime Database
News  |  4/10/2007  | 
National repository will let stores, law enforcement agencies share information about retail crimes
Critical WiFi Bug Found on Linux
News  |  4/10/2007  | 
France Telecom researcher demo'd device driver bug in MadWiFi Linux kernel
Your Own Users? Hacking?
News  |  4/10/2007  | 
Say it isn't so... But the only way to know for sure is by monitoring their HTTP traffic (a.k.a. spying)
Arxceo Turns Table at Conference
News  |  4/10/2007  | 
Arxceo's anti-reconnaissance security appliance turns the table on cyber specialists at engineering conference
GRISOFT Intros Free AVG Anti-Rootkit
News  |  4/10/2007  | 
GRISOFT, the developer of AVG Internet security software, introduced a new, free product aimed at detection and removal of Rootkits
PCI Won't Save You
News  |  4/9/2007  | 
You need more than standards and legal requirements to detect and prevent data leakage
Researchers Put Nail in WEP's Coffin
News  |  4/9/2007  | 
Already-weak encryption protocol now can be cracked in three seconds
RFID Under Attack Again
News  |  4/9/2007  | 
RFID hacking isn't rocket science, but the risk depends on proper use, deployment
Glued to Security
News  |  4/9/2007  | 
Bet your security strategy doesn't account for this exploit
Sophos Launches New Strategy
News  |  4/9/2007  | 
Sophos announced the launch of its 100 percent channel sales strategy in North America
Promisec Supports Vista
News  |  4/9/2007  | 
Promisec announced enhancements to its award-winning Promisec Spectator Professional software
Jack of All Security Trades
News  |  4/6/2007  | 
To manage security, you also need to know people, math, and how to take out the garbage
Whirlpool Spins New Address Scheme
News  |  4/6/2007  | 
New DNS address management tools help appliance maker wash away previous security woes
Solving IPTV's Security Problem
News  |  4/5/2007  | 
Vendors wrestle to protect emerging services from attacks - without driving cost-conscious customers away
Kaspersky Finds First iPod Virus
News  |  4/5/2007  | 
Kaspersky Lab discovered the first virus designed to infect iPod portable media players
Hacking Bluetooth With a USB Stick
News  |  4/5/2007  | 
European researchers have built a Bluetooth sniffer on a $30 USB dongle
Laptop Lockdown
News  |  4/5/2007  | 
Mobility means exposure to theft, loss, and infection, but you can reduce the risks
Audit Uncovers IRS Security Flaws
News  |  4/4/2007  | 
Tax agency not doing enough to protect taxpayer data on laptops, PCs, according to Treasury report
Read This, Or I'll Kill You
News  |  4/4/2007  | 
Or, how the rising tide of threats made online creates big-time legal exposure for users' employers
MessageLabs Reports on Sinister Activity
News  |  4/3/2007  | 
MessageLabs announced the results of its MessageLabs Intelligence Report for March 2007
Microsoft's 'Stepto' Gets Into the Game
News  |  4/3/2007  | 
Microsoft security star Stephen Toulouse talks researchers and Microsofties, cooking, and golden retrievers
Garbage Out, Cops In
News  |  4/3/2007  | 
Texas Attorney General throws the book at companies that don't properly throw it away
Malware & Attacker, Exposed
News  |  4/3/2007  | 
New research will show how to decode malware hidden with JavaScript
eEye's Two Releases
News  |  4/3/2007  | 
Ross Brown says his removal as CEO of eEye Digital Security was no surprise
March's Email Madness
News  |  4/3/2007  | 
NCAA tournament pools raise level of email traffic - and managers' blood pressure
A Hack With Teeth
News  |  4/2/2007  | 
Cross-site scripting can hit any Web app - from your dentist's Internet kiosk to your bank ATM
Dude, Where's Your PC?
News  |  4/2/2007  | 
Audit exposes lost computers at counterintelligence agency, need for better inventory management
Arbor Enhances Peakflow X 3.7
News  |  4/2/2007  | 
Arbor Networks announced a new version of its enterprise solution, Arbor Peakflow X 3.7
Kaspersky Lab Releases KOSS
News  |  4/2/2007  | 
Kaspersky Lab announced the availability of Kaspersky Open Space Security
Fortify Documents Vulnerability in Web 2.0
News  |  4/2/2007  | 
Fortify's Security Research Group has documented a major vulnerability associated specifically with Web 2.0 and Ajax-style software
Security App Protects Against Windows Attack
News  |  4/2/2007  | 
eEye's Blink Personal stops Windows zero-day attack that's building around the Internet
Sophos Announces Top 10 Threats
News  |  4/2/2007  | 
Sophos has revealed the most prevalent malware threats causing problems for computer users around the world during March 2007
No Starch Press Publishes Guide
News  |  4/2/2007  | 
Webbots, Spiders, and Screen Scrapers - new from No Starch Press
<<   <   Page 2 / 2


Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19807
PUBLISHED: 2019-12-15
In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for ...
CVE-2014-8650
PUBLISHED: 2019-12-15
python-requests-Kerberos through 0.5 does not handle mutual authentication
CVE-2014-3536
PUBLISHED: 2019-12-15
CFME (CloudForms Management Engine) 5: RHN account information is logged to top_output.log during registration
CVE-2014-3643
PUBLISHED: 2019-12-15
jersey: XXE via parameter entities not disabled by the jersey SAX parser
CVE-2014-3652
PUBLISHED: 2019-12-15
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.