Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in June 2007
<<   <   Page 2 / 2
Security Charlatan
News  |  6/12/2007  | 
Founder of LifeLock, an identity protection service, steps down amid charges of identity theft
Pfizer Falls Victim to P2P Hack
News  |  6/12/2007  | 
Attackers access personal information on 17,000 employees via laptop vulnerability
Enterprises Mull Own Bug Research
News  |  6/12/2007  | 
To bug hunt or not to bug hunt - that's the question enterprises face
Anti-Spam Group Under Attack
News  |  6/12/2007  | 
Spammers launch denial of service exploit against Spamhaus
Architect's Many Identities
News  |  6/11/2007  | 
Dale Olds, creator of Novell's eDirectory, talks open-source ID, tuba photography, and how not to configure your home firewall
Phishers: No Points for Originality
News  |  6/11/2007  | 
More than 90 percent of phishing attacks come from kits, ISS researcher says
Attackers Break Into UVA Database
News  |  6/11/2007  | 
Personal data on nearly 6,000 former and current faculty members at the University of Virginia was compromised
Crossbeam Launches Security Switch
News  |  6/11/2007  | 
Crossbeam launches next generation X-Series security switch
SPI Dynamics to Give Presentations
News  |  6/11/2007  | 
SPI Dynamics to give Web app security presentations at HP conferences
Acunetix Upgrades Web Vulnerability Scanner
News  |  6/11/2007  | 
New version 5 of Acunetix Web Vulnerability Scanner ensures companies meet PCI compliancy
P2P's Unintended Leaks
News  |  6/8/2007  | 
Or, how file-hungry music and video fans might download business-sensitive data
New Software Detects Spyware
News  |  6/8/2007  | 
System SoftLab has announced the immediate availability of Security Process Detector 3.00
Security's Dollar Daze
News  |  6/8/2007  | 
Getting resources for security means making a savvy business case
Laws Threaten Security Researchers
News  |  6/8/2007  | 
New Computer Security Institute report reveals how some computer security laws inadvertently hurt the good guys
Privacy Premium Doesn't Faze Buyers
News  |  6/7/2007  | 
CMU study shows online shoppers will pay more for products guarded by a well-met privacy policy
A Multitude of SIMs
News  |  6/6/2007  | 
All the emerging security info management options may overwhelm IT buyers, but here's how to start sorting them out
Pop-Up Predicament
News  |  6/6/2007  | 
Amero's new trial is a victory for parents and kids who end up on the wrong screen
Protegrity Unveils Software Suite
News  |  6/6/2007  | 
Protegrity launches Defiance Security Software Suite 4.3
Firewall Wish List
News  |  6/5/2007  | 
Or, why you should absolutely perform outbound firewall filtering
Security's Soft Underbelly
News  |  6/5/2007  | 
Many companies secure the walls, but databases remain the soft, chewy center
Using Bugs as Leverage
News  |  6/5/2007  | 
Vulnerability research, scanning can give enterprises an edge, experts say
Vendors Tighten Up Security
News  |  6/5/2007  | 
NetIQ, MessageLabs, and Proofpoint roll out new products, market data at Gartner summit
Microsoft Unwraps Security Platform
News  |  6/5/2007  | 
Next-generation Forefront product to bring broad array of security tools under one umbrella
VeriSign to Launch Wireless IPS Service
News  |  6/4/2007  | 
VeriSign to team up with AirMagnet to offer WLAN managed security service
Imperva Secures Databases
News  |  6/4/2007  | 
Imperva introduces ADC Insight Services to enable organizations to quickly and easily secure databases and meet regulatory pressures
AirMagnet Upgrades Analyzer
News  |  6/4/2007  | 
Announces AirMagnet Handheld Analyzer 7.0; latest release introduces support for the 802.11g wireless LAN protocol
Security's Sea Change
News  |  6/4/2007  | 
The security boom is over... Long live the security boom
Oakley Combines User Monitoring, Forensics
News  |  6/4/2007  | 
Oakley Networks SureView 5.0 integrates network and desktop insider threat detection and remediation
Scottrade Deploys Source-Code Analysis
News  |  6/4/2007  | 
Leading online brokerage Scottrade makes application security a priority with Fortify Software
Ounce Labs Upgrades Tool
News  |  6/4/2007  | 
Ounce Labs announces Ounce 5.0; enterprise-level security enhancements and support for critical industry regulations and best practices
MessageLabs Reports Phishing Increase
News  |  6/4/2007  | 
MessageLabs announced the findings of its MessageLabs Intelligence Report for May 2007
WhiteHat Summer Speaking Tour
News  |  6/4/2007  | 
WhiteHat Security announced details for the Company's early Summer 2007 speaking tour
eEye to Enter Security Services
News  |  6/4/2007  | 
Vulnerabilty assessment and endpoint software company will debut Preview today
DR Survey: Insiders Take the Cake
News  |  6/1/2007  | 
Dark Reading regulars say the biggest threat comes from within their own organization
All The Wrong Moves
News  |  6/1/2007  | 
Government missteps could make security tougher for everyone
Dismantling a Botnet
News  |  6/1/2007  | 
Lopping off its head won't kill a botnet - and the bots may never truly be free
Sophos Unveils May's Top 10 Threats
News  |  6/1/2007  | 
Sophos has revealed the most prevalent malware threats causing problems for computer users around the world in May 2007
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-01
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
PUBLISHED: 2022-07-01
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
PUBLISHED: 2022-07-01
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.