Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2007
Page 1 / 3   >   >>
Phishers Play Top 40
News  |  8/31/2007  | 
Latest spam pretends to be video from your favorite musical artist
Bimba Deploys Sidewinder
News  |  8/31/2007  | 
Secure Computing announced that Bimba Manufacturing has switched to the Sidewinder Network Gateway Security appliance
When Web Servers Attack
News  |  8/30/2007  | 
Even in a DMZ, a Web server can be a dangerous weapon
Comodo Intros Memory Guardian
News  |  8/30/2007  | 
Comodo introduces Memory Guardian to protect consumers against buffer overflow attacks
Korea Investigates Anti-Spyware Makers
News  |  8/30/2007  | 
Korean government asks police to look into 'anti-spyware' tools that actually spread spyware
Storm Hits Blogger
News  |  8/30/2007  | 
The ubiquitous Storm Trojan has found a new home - on spam blog sites in Google's Blogger network
On the Trail of 'Fast Flux' Botnets
News  |  8/29/2007  | 
Stealth botnet method makes botnets hard to kill, but not impossible
Consumers Concerned With Phishing
News  |  8/29/2007  | 
Cloudmark announced the results of a nationwide poll conducted on its behalf by Harris Interactive
PDF Spam Declines Sharply
News  |  8/29/2007  | 
'Is PDF spam simply not working for the spammers?' Sophos asks
Jordan's Furniture Selects Sophos
News  |  8/29/2007  | 
Jordan's Furniture selected Sophos Endpoint Security and Control
Enterprises Wrestle With Security Policies
News  |  8/28/2007  | 
Corporate security policies often are not enforced, according to newly-published survey by RSA and Forrester
'Dream Team' Takes on Black Hats
News  |  8/28/2007  | 
Feds, law enforcement, ISPs, and researchers pow-wow in closed meeting on how to catch the bad guys
Black Hat's Video Review
News  |  8/28/2007  | 
One-on-one interviews offer a new view on Black Hat's key issues
Promisec Helps SMEs Combat Security Threats
News  |  8/28/2007  | 
SMEs need to address internal threats, leverage automation to ensure highest levels of security and threat mitigation
IM Threats Spike Nearly 100% in August
News  |  8/28/2007  | 
Akonix IM Threat Watch tracks 38 attacks
Sophos: Don't Download That YouTube Video
News  |  8/28/2007  | 
New variation of Storm worm drops Ecard disguise for online movie masquerade
Merchant-Accounts.ca, Comodo Partner
News  |  8/28/2007  | 
Merchant-Accounts.ca and Comodo announce partnership to deliver PCI compliance and Web vulnerability scanning to Canadian customers
Symantec Launches Norton 2008
News  |  8/28/2007  | 
Symantec announced the launch of Norton Internet Security 2008 and Norton AntiVirus 2008
China's Premier 'Gravely Concerned' by Hack on Germany
News  |  8/27/2007  | 
Top-ranked officials discuss alleged cyber attack at diplomatic meeting
New Intel Processor Fights Rootkits, Virtualization Threats
News  |  8/27/2007  | 
But experts say new features still aren't true anti-rootkit technologies
Study: SMBs Overconfident in IT Security
News  |  8/27/2007  | 
According to Websense, SMBs fail to take adequate steps to reduce the risk off data loss from Web-based security threats
Anchiva Delivers 800,000 Signatures
News  |  8/27/2007  | 
Rapid RxLabs is now delivering over 800,000 signatures to detect and prevent malware from entering enterprise networks
Phishers in Microsoft's Clothing
News  |  8/24/2007  | 
Two new spam scams masquerade as official messages from top Microsoft officials
Red Curtain Reveals Malware
News  |  8/24/2007  | 
Free tool helps expose malicious software by its behavior
The Lost Companies
News  |  8/24/2007  | 
Security troubles lead to disappearance of two established organizations in two months
Hacking for Charity
News  |  8/23/2007  | 
New organization looking for a few good hackers to assist nonprofits - gratis
'Defenestration' Testing
News  |  8/23/2007  | 
Does your organization even know what secrets it's supposed to be keeping?
Crypto Makes the Grade at Baylor
News  |  8/23/2007  | 
University taps PGP to protect faculty, staff laptops - and to comply with state laws in the event of data loss
Eight Sure-Fire Ways to Beat a Security Audit
News  |  8/23/2007  | 
Experts share tips on how to avoid the most common pitfalls in an audit
Slammer, Other Older Threats Making a Comeback
News  |  8/23/2007  | 
Researchers at IBM ISS say Slammer is the most common network threat they see today due to 'retired' signatures
UK Plans Big Spend on ID Management
News  |  8/22/2007  | 
Public-sector spending will increase 50 percent in the next year alone, new study says
Hacking Germany's New Computer Crime Law
News  |  8/22/2007  | 
German and US researchers lay low, question just how far new law will go
Finding the Leaks in Leak Prevention
News  |  8/22/2007  | 
Data leak prevention tools may not be enough to stop determined bad apples
Bitdefender: Students Need Update
News  |  8/22/2007  | 
BitDefender warns college students about the need to protect their computers with the latest security software updates
Ukranian Suspect Could Help Break TJX Case
News  |  8/22/2007  | 
Details of the TJX hack begin to rapidly unfold thanks to a recent arrest
Beware of 'Confirmation Spam'
News  |  8/22/2007  | 
Marshal issues warning against new storm of 'confirmation spam'
Site Services Pay Damages for Bill-Doctoring
News  |  8/21/2007  | 
Website services put $24 million worth of unauthorized charges on customers' bills, FTC says
Cenzic Patent Case Worries Web Researchers, Vendors
News  |  8/21/2007  | 
Controversial patent could affect other Web app scanners, research
Blue Lane Passes Microsoft Interop Test
News  |  8/21/2007  | 
Blue Lane Technologies successfully runs and evaluates protocol test cases at Microsoft's Enterprise Engineering Center
Sipera VIPER Tests for VOIP/UC Vulnerabilities
News  |  8/21/2007  | 
Sipera Systems announced the availability of Sipera VIPER Services
Google's Flawed Search for Security
News  |  8/21/2007  | 
Despite promises, search engine's security is for the birds
63% of Malware Distributed by US Sites
News  |  8/21/2007  | 
Cyveillance announced its latest 'Online Financial Fraud and Identity Theft Report'
Network Testing Labs Rates Mi5 Webgate
News  |  8/21/2007  | 
Mi5 Networks announced that its Webgate 009 has earned a World Class Award for Best Anti-Malware Gateway Device from Network Testing Labs
Whitedust Security Site Shuttered
News  |  8/20/2007  | 
Security portal quietly shuts down amid criticism, targeted attacks
ZyXEL Adds UTM Tool
News  |  8/20/2007  | 
Communications Inc. unveiled its new Unified Security Gateway product line with the ZyWALL USG300
Trend Micro IDs Top Security Threats in 2007
News  |  8/20/2007  | 
Trend Micro published the TrendLabs Semi-annual Threat Roundup and Forecast
A Storm of Human Error
News  |  8/20/2007  | 
Storm worm's proliferation proves that end users still have a lot of learning to do
F5 Selects Mu Security
News  |  8/20/2007  | 
Mu Security announced that F5 is deploying the Mu-4000 Security Analyzer
Trojan on Monster.com Steals Personal Data
News  |  8/20/2007  | 
Researcher discovers theft of more than 1.6 million pieces of personal data affecting 'several hundred thousand' users at recruiting sites
MarkMonitor: Phishers Increase 'Brandjacking'
News  |  8/20/2007  | 
MarkMonitor Brandjacking Index exposes online scams that threaten top pharmaceutical brands and hurt consumers
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.