Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in June 2007
<<   <   Page 2 / 2
Security Charlatan
News  |  6/12/2007  | 
Founder of LifeLock, an identity protection service, steps down amid charges of identity theft
Pfizer Falls Victim to P2P Hack
News  |  6/12/2007  | 
Attackers access personal information on 17,000 employees via laptop vulnerability
Enterprises Mull Own Bug Research
News  |  6/12/2007  | 
To bug hunt or not to bug hunt - that's the question enterprises face
Anti-Spam Group Under Attack
News  |  6/12/2007  | 
Spammers launch denial of service exploit against Spamhaus
Architect's Many Identities
News  |  6/11/2007  | 
Dale Olds, creator of Novell's eDirectory, talks open-source ID, tuba photography, and how not to configure your home firewall
Phishers: No Points for Originality
News  |  6/11/2007  | 
More than 90 percent of phishing attacks come from kits, ISS researcher says
Attackers Break Into UVA Database
News  |  6/11/2007  | 
Personal data on nearly 6,000 former and current faculty members at the University of Virginia was compromised
Crossbeam Launches Security Switch
News  |  6/11/2007  | 
Crossbeam launches next generation X-Series security switch
SPI Dynamics to Give Presentations
News  |  6/11/2007  | 
SPI Dynamics to give Web app security presentations at HP conferences
Acunetix Upgrades Web Vulnerability Scanner
News  |  6/11/2007  | 
New version 5 of Acunetix Web Vulnerability Scanner ensures companies meet PCI compliancy
P2P's Unintended Leaks
News  |  6/8/2007  | 
Or, how file-hungry music and video fans might download business-sensitive data
New Software Detects Spyware
News  |  6/8/2007  | 
System SoftLab has announced the immediate availability of Security Process Detector 3.00
Security's Dollar Daze
News  |  6/8/2007  | 
Getting resources for security means making a savvy business case
Laws Threaten Security Researchers
News  |  6/8/2007  | 
New Computer Security Institute report reveals how some computer security laws inadvertently hurt the good guys
Privacy Premium Doesn't Faze Buyers
News  |  6/7/2007  | 
CMU study shows online shoppers will pay more for products guarded by a well-met privacy policy
A Multitude of SIMs
News  |  6/6/2007  | 
All the emerging security info management options may overwhelm IT buyers, but here's how to start sorting them out
Pop-Up Predicament
News  |  6/6/2007  | 
Amero's new trial is a victory for parents and kids who end up on the wrong screen
Protegrity Unveils Software Suite
News  |  6/6/2007  | 
Protegrity launches Defiance Security Software Suite 4.3
Firewall Wish List
News  |  6/5/2007  | 
Or, why you should absolutely perform outbound firewall filtering
Security's Soft Underbelly
News  |  6/5/2007  | 
Many companies secure the walls, but databases remain the soft, chewy center
Using Bugs as Leverage
News  |  6/5/2007  | 
Vulnerability research, scanning can give enterprises an edge, experts say
Vendors Tighten Up Security
News  |  6/5/2007  | 
NetIQ, MessageLabs, and Proofpoint roll out new products, market data at Gartner summit
Microsoft Unwraps Security Platform
News  |  6/5/2007  | 
Next-generation Forefront product to bring broad array of security tools under one umbrella
VeriSign to Launch Wireless IPS Service
News  |  6/4/2007  | 
VeriSign to team up with AirMagnet to offer WLAN managed security service
Imperva Secures Databases
News  |  6/4/2007  | 
Imperva introduces ADC Insight Services to enable organizations to quickly and easily secure databases and meet regulatory pressures
AirMagnet Upgrades Analyzer
News  |  6/4/2007  | 
Announces AirMagnet Handheld Analyzer 7.0; latest release introduces support for the 802.11g wireless LAN protocol
Security's Sea Change
News  |  6/4/2007  | 
The security boom is over... Long live the security boom
Oakley Combines User Monitoring, Forensics
News  |  6/4/2007  | 
Oakley Networks SureView 5.0 integrates network and desktop insider threat detection and remediation
Scottrade Deploys Source-Code Analysis
News  |  6/4/2007  | 
Leading online brokerage Scottrade makes application security a priority with Fortify Software
Ounce Labs Upgrades Tool
News  |  6/4/2007  | 
Ounce Labs announces Ounce 5.0; enterprise-level security enhancements and support for critical industry regulations and best practices
MessageLabs Reports Phishing Increase
News  |  6/4/2007  | 
MessageLabs announced the findings of its MessageLabs Intelligence Report for May 2007
WhiteHat Summer Speaking Tour
News  |  6/4/2007  | 
WhiteHat Security announced details for the Company's early Summer 2007 speaking tour
eEye to Enter Security Services
News  |  6/4/2007  | 
Vulnerabilty assessment and endpoint software company will debut Preview today
DR Survey: Insiders Take the Cake
News  |  6/1/2007  | 
Dark Reading regulars say the biggest threat comes from within their own organization
All The Wrong Moves
News  |  6/1/2007  | 
Government missteps could make security tougher for everyone
Dismantling a Botnet
News  |  6/1/2007  | 
Lopping off its head won't kill a botnet - and the bots may never truly be free
Sophos Unveils May's Top 10 Threats
News  |  6/1/2007  | 
Sophos has revealed the most prevalent malware threats causing problems for computer users around the world in May 2007
<<   <   Page 2 / 2

How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.