Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2006
<<   <   Page 2 / 2
Core Unveils Product
News  |  8/14/2006  | 
Core Security Technologies announced CORE IMPACT 6, a new edition of the company's flagship software product
Search Engine Goes On Offensive
News  |  8/11/2006  | 
Malware search engine Offensive Computing helps security pros find, analyze, and download hostile files
Second-Hand Drives Yield First-Class Data
News  |  8/11/2006  | 
Study shows companies, users still vulnerable to data theft via unerased, recycled hard drives
IT's Double Standard
News  |  8/11/2006  | 
When it comes to trust and security, IT pros don't always practice what they preach
A Portable Hacker Helper
News  |  8/10/2006  | 
Immunity's new penetration testing tool looks like a PDA, enabling white hat hackers to do their work on the sly
Researchers Break Into Bank
News  |  8/10/2006  | 
Cardiff University researchers have discovered how to access online accounts of HSBC banking customers
Spirent Buys Imperfect
News  |  8/10/2006  | 
Spirent has acquired the business of Imperfect Networks
Need Credit? Click Here
News  |  8/10/2006  | 
Kaspersky Lab uncovers site with stolen credit card, ATM, and other personal data
Apple FCU Selects Comodo
News  |  8/10/2006  | 
Apple FCU has selected Comodo's new technology, VerificationEngine to protect members from phishing and pharming attacks
The Portable Puzzle
News  |  8/10/2006  | 
Solutions for managing security of mobile systems and portable storage devices still elude many enterprises
Vista: No Silver Bullet for Security
News  |  8/9/2006  | 
Microsoft's Vista operating system will be more secure than its predecessors, but keep your Patch Tuesdays open
AirTight Intros Products
News  |  8/9/2006  | 
AirTight Networks, the leading provider of wireless intrusion prevention solutions, announced that three of its products
IT's Roving Eyes
News  |  8/9/2006  | 
From snooping to sabotage, your IT department might be your enterprise's greatest unchecked security threat
Novell Updates Sentinel
News  |  8/9/2006  | 
Novell announced the first significant update to Sentinel
ScanSafe Details Malware
News  |  8/9/2006  | 
ScanSafe has released its latest Global Threat Report on Web filtering, spyware, and viruses
Microsoft's Big Patch Day
News  |  8/8/2006  | 
Microsoft's Patch Tuesday features fixes for a potentially large worm attack and the long-suffering Internet Explorer
Users Outraged by AOL Gaffe
News  |  8/8/2006  | 
Users advocate boycott, following blunder that exposes search logs of 650,000 AOL customers
Code May Sour BlackBerry Users
News  |  8/8/2006  | 
New proof-of-concept code could give an attacker access to enterprise networks using a BlackBerry handheld
Antivirus, Imaging Bundled
News  |  8/8/2006  | 
Imaging Sciences International will be bundling GRISOFT's AVG Anti-Virus software with its i-CAT advanced 3-D imaging technology devices
Free Fuzzing Tool Launched
News  |  8/7/2006  | 
Researcher HD Moore is at it again - this time offering his ActiveX fuzzing tool for free
New WMF Bug on the Loose
News  |  8/7/2006  | 
A researcher has published a new flaw in Windows MetaFile
NYC Transit Selects Blue Coat
News  |  8/7/2006  | 
New York City Transit has selected Blue Coat SG appliances and Blue Coat WebFilter to secure, control and accelerate its network
Microsoft to Issue 12 New Patches
News  |  8/4/2006  | 
Microsoft's slate of security patches Tuesday could include fixes for PowerPoint and several Windows bugs
Laptop Theft Hits Toyota
News  |  8/4/2006  | 
A stolen laptop may contain the names and Social Security info of 1,500 employees at San Antonio truck plant, auto dealer says
Google Is Evil
News  |  8/4/2006  | 
The popular search engine is a great source for nascent hackers who want to build up a collection of sploits
No Policies? No Results
News  |  8/4/2006  | 
Writing policies for mobile and portable storage devices may seem like an exercise in futility, but without them, there's no law in town
Metasploit 3.0 Makes Splash at Black Hat
News  |  8/3/2006  | 
Upgrades to popular flaw-finding tool unveiled at Vegas conference
Big Botnet Cast Wide Net in UK
News  |  8/3/2006  | 
An unusually large botnet swamped the UK this week with over 8 million phishing emails
No Wires & No Policies
News  |  8/2/2006  | 
Despite the convenience of wireless and portable devices, most security policies still don't embrace them, according to a new Dark Reading survey
Social Networking Gone Bad
News  |  8/2/2006  | 
Worms and adware attacks are just a taste of what social networking sites could face as they evolve and attackers get more focused
Olmstead Integrates Passfaces
News  |  8/2/2006  | 
RC Olmstead selects Passfaces strong authentication solution
Apple Blasts Mac OS X Bugs
News  |  8/2/2006  | 
Apple has issued a big batch of patches for its Mac OS X
Worm Targets Microsoft Powershell
News  |  8/1/2006  | 
Just a week away from Patch Tuesday, Microsoft is target of a proof-of-concept worm and an email phishing exploit
Kaspersky Releases Report
News  |  8/1/2006  | 
The July online scanner Top Twenty is something of a watershed as it includes absolutely all classes of malicious program
HR: Security Spending on the Rise
News  |  8/1/2006  | 
Heavy Reading Enterprise research says companies plan to increase security spending in the next two years
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-01
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
PUBLISHED: 2022-07-01
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
PUBLISHED: 2022-07-01
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.