Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2007
Page 1 / 3   >   >>
Phishers Play Top 40
News  |  8/31/2007  | 
Latest spam pretends to be video from your favorite musical artist
Bimba Deploys Sidewinder
News  |  8/31/2007  | 
Secure Computing announced that Bimba Manufacturing has switched to the Sidewinder Network Gateway Security appliance
When Web Servers Attack
News  |  8/30/2007  | 
Even in a DMZ, a Web server can be a dangerous weapon
Comodo Intros Memory Guardian
News  |  8/30/2007  | 
Comodo introduces Memory Guardian to protect consumers against buffer overflow attacks
Korea Investigates Anti-Spyware Makers
News  |  8/30/2007  | 
Korean government asks police to look into 'anti-spyware' tools that actually spread spyware
Storm Hits Blogger
News  |  8/30/2007  | 
The ubiquitous Storm Trojan has found a new home - on spam blog sites in Google's Blogger network
On the Trail of 'Fast Flux' Botnets
News  |  8/29/2007  | 
Stealth botnet method makes botnets hard to kill, but not impossible
Consumers Concerned With Phishing
News  |  8/29/2007  | 
Cloudmark announced the results of a nationwide poll conducted on its behalf by Harris Interactive
PDF Spam Declines Sharply
News  |  8/29/2007  | 
'Is PDF spam simply not working for the spammers?' Sophos asks
Jordan's Furniture Selects Sophos
News  |  8/29/2007  | 
Jordan's Furniture selected Sophos Endpoint Security and Control
Enterprises Wrestle With Security Policies
News  |  8/28/2007  | 
Corporate security policies often are not enforced, according to newly-published survey by RSA and Forrester
'Dream Team' Takes on Black Hats
News  |  8/28/2007  | 
Feds, law enforcement, ISPs, and researchers pow-wow in closed meeting on how to catch the bad guys
Black Hat's Video Review
News  |  8/28/2007  | 
One-on-one interviews offer a new view on Black Hat's key issues
Promisec Helps SMEs Combat Security Threats
News  |  8/28/2007  | 
SMEs need to address internal threats, leverage automation to ensure highest levels of security and threat mitigation
IM Threats Spike Nearly 100% in August
News  |  8/28/2007  | 
Akonix IM Threat Watch tracks 38 attacks
Sophos: Don't Download That YouTube Video
News  |  8/28/2007  | 
New variation of Storm worm drops Ecard disguise for online movie masquerade
Merchant-Accounts.ca, Comodo Partner
News  |  8/28/2007  | 
Merchant-Accounts.ca and Comodo announce partnership to deliver PCI compliance and Web vulnerability scanning to Canadian customers
Symantec Launches Norton 2008
News  |  8/28/2007  | 
Symantec announced the launch of Norton Internet Security 2008 and Norton AntiVirus 2008
China's Premier 'Gravely Concerned' by Hack on Germany
News  |  8/27/2007  | 
Top-ranked officials discuss alleged cyber attack at diplomatic meeting
New Intel Processor Fights Rootkits, Virtualization Threats
News  |  8/27/2007  | 
But experts say new features still aren't true anti-rootkit technologies
Study: SMBs Overconfident in IT Security
News  |  8/27/2007  | 
According to Websense, SMBs fail to take adequate steps to reduce the risk off data loss from Web-based security threats
Anchiva Delivers 800,000 Signatures
News  |  8/27/2007  | 
Rapid RxLabs is now delivering over 800,000 signatures to detect and prevent malware from entering enterprise networks
Phishers in Microsoft's Clothing
News  |  8/24/2007  | 
Two new spam scams masquerade as official messages from top Microsoft officials
Red Curtain Reveals Malware
News  |  8/24/2007  | 
Free tool helps expose malicious software by its behavior
The Lost Companies
News  |  8/24/2007  | 
Security troubles lead to disappearance of two established organizations in two months
Hacking for Charity
News  |  8/23/2007  | 
New organization looking for a few good hackers to assist nonprofits - gratis
'Defenestration' Testing
News  |  8/23/2007  | 
Does your organization even know what secrets it's supposed to be keeping?
Crypto Makes the Grade at Baylor
News  |  8/23/2007  | 
University taps PGP to protect faculty, staff laptops - and to comply with state laws in the event of data loss
Eight Sure-Fire Ways to Beat a Security Audit
News  |  8/23/2007  | 
Experts share tips on how to avoid the most common pitfalls in an audit
Slammer, Other Older Threats Making a Comeback
News  |  8/23/2007  | 
Researchers at IBM ISS say Slammer is the most common network threat they see today due to 'retired' signatures
UK Plans Big Spend on ID Management
News  |  8/22/2007  | 
Public-sector spending will increase 50 percent in the next year alone, new study says
Hacking Germany's New Computer Crime Law
News  |  8/22/2007  | 
German and US researchers lay low, question just how far new law will go
Finding the Leaks in Leak Prevention
News  |  8/22/2007  | 
Data leak prevention tools may not be enough to stop determined bad apples
Bitdefender: Students Need Update
News  |  8/22/2007  | 
BitDefender warns college students about the need to protect their computers with the latest security software updates
Ukranian Suspect Could Help Break TJX Case
News  |  8/22/2007  | 
Details of the TJX hack begin to rapidly unfold thanks to a recent arrest
Beware of 'Confirmation Spam'
News  |  8/22/2007  | 
Marshal issues warning against new storm of 'confirmation spam'
Site Services Pay Damages for Bill-Doctoring
News  |  8/21/2007  | 
Website services put $24 million worth of unauthorized charges on customers' bills, FTC says
Cenzic Patent Case Worries Web Researchers, Vendors
News  |  8/21/2007  | 
Controversial patent could affect other Web app scanners, research
Blue Lane Passes Microsoft Interop Test
News  |  8/21/2007  | 
Blue Lane Technologies successfully runs and evaluates protocol test cases at Microsoft's Enterprise Engineering Center
Sipera VIPER Tests for VOIP/UC Vulnerabilities
News  |  8/21/2007  | 
Sipera Systems announced the availability of Sipera VIPER Services
Google's Flawed Search for Security
News  |  8/21/2007  | 
Despite promises, search engine's security is for the birds
63% of Malware Distributed by US Sites
News  |  8/21/2007  | 
Cyveillance announced its latest 'Online Financial Fraud and Identity Theft Report'
Network Testing Labs Rates Mi5 Webgate
News  |  8/21/2007  | 
Mi5 Networks announced that its Webgate 009 has earned a World Class Award for Best Anti-Malware Gateway Device from Network Testing Labs
Whitedust Security Site Shuttered
News  |  8/20/2007  | 
Security portal quietly shuts down amid criticism, targeted attacks
ZyXEL Adds UTM Tool
News  |  8/20/2007  | 
Communications Inc. unveiled its new Unified Security Gateway product line with the ZyWALL USG300
Trend Micro IDs Top Security Threats in 2007
News  |  8/20/2007  | 
Trend Micro published the TrendLabs Semi-annual Threat Roundup and Forecast
A Storm of Human Error
News  |  8/20/2007  | 
Storm worm's proliferation proves that end users still have a lot of learning to do
F5 Selects Mu Security
News  |  8/20/2007  | 
Mu Security announced that F5 is deploying the Mu-4000 Security Analyzer
Trojan on Monster.com Steals Personal Data
News  |  8/20/2007  | 
Researcher discovers theft of more than 1.6 million pieces of personal data affecting 'several hundred thousand' users at recruiting sites
MarkMonitor: Phishers Increase 'Brandjacking'
News  |  8/20/2007  | 
MarkMonitor Brandjacking Index exposes online scams that threaten top pharmaceutical brands and hurt consumers
Page 1 / 3   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6486
PUBLISHED: 2020-07-10
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.
CVE-2012-6487
PUBLISHED: 2020-07-10
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.
CVE-2012-6488
PUBLISHED: 2020-07-10
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.
CVE-2012-6489
PUBLISHED: 2020-07-10
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.
CVE-2012-6490
PUBLISHED: 2020-07-10
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.