Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in September 2006
<<   <   Page 2 / 2
Window's New World
News  |  9/12/2006  | 
Former Microsoft security strategist Window Snyder, who now is in charge of security at Mozilla, talks about new security initiatives and features that are planned for the open source suite
Symantec Intros '07
News  |  9/12/2006  | 
Symantec announced the launch of Norton AntiVirus 2007 and Norton Internet Security 2007
Crypto Flaw Prone to Spoofing
News  |  9/11/2006  | 
Newly discovered flaw in OpenSSL leaves some RSA cryptography implementations vulnerable
Fantasy Site Hack Exposes Data on 650,000 Users
News  |  9/11/2006  | 
Users of Second Life site forced to change passwords after zero-day exploit hits Web server
Email Security Tools Converge
News  |  9/11/2006  | 
Declude's Interceptor gateway is the latest tool that folds multiple features into one offering, following ISS' IPS-based email appliance
Learning to Love the Audit
News  |  9/8/2006  | 
Love 'em or hate 'em, security audits are now a way of life. Your best bet is to stop fighting and start automating
Credit Card Giants Modify Security Specs
News  |  9/8/2006  | 
Payment Card Industry (PCI) authorities clarify merchant security standards, but experts aren't sure compliance will be much easier
Microsoft's Patch 'Lite' Tuesday
News  |  9/8/2006  | 
It may be the calm before the storm, but Microsoft has only three patches on tap
ISS to Unveil IPS-based Email Security
News  |  9/8/2006  | 
Internet Security Systems' forthcoming email appliance blends traditional mail security with IPS and behavioral analysis
Stolen Data's Black Market
News  |  9/7/2006  | 
Organized crime is chief buyer for information stolen by hackers and insiders, experts say
Facebook Gets a Little Too Social
News  |  9/7/2006  | 
Facebook users boycott new features that broadcast their every move, but isn't all this 'sharing' what social nets are all about?
Red Hat Launches Initiative
News  |  9/7/2006  | 
Red Hat announced its continuing commitment to superior security services with a new initiative
Researchers Challenge DOS Attack Data
News  |  9/6/2006  | 
Nearly three-quarters of denial-of-service attacks come from a small number of troublemakers, new research says
Cisco, Microsoft Unveil Plan
News  |  9/6/2006  | 
Cisco Systems, Microsoft are delivering on their previously stated commitment
Insider: P2P Drives Use of DPI
News  |  9/6/2006  | 
Light Reading Insider projects that revenues for DPI will soar to nearly $600 million in 2010
Core Security Advises
News  |  9/6/2006  | 
Core Security Technologies issued advisories disclosing multiple vulnerabilities
Dual Authentication Tapped in Phish Fight
News  |  9/5/2006  | 
CMU anti-phishing prototype keeps users from giving away the store, but the catch is everyone has to deploy and use it
Zero-Day Exploit Targets Word
News  |  9/5/2006  | 
A new exploit circulating in the wild goes after Word 2000
Rootkit Changes Search Results
News  |  9/1/2006  | 
Zcodec exploit combines rootkit with social engineering, Trojans to avoid detection
Third-Party Testing: Risky Business?
News  |  9/1/2006  | 
Vulnerability assessments and penetration testing sometimes can cause problems in your network in the process of exposing them
Report Unveils Top Twenty
News  |  9/1/2006  | 
The August online scanner Top Twenty is the most unusual so far
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15058
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
CVE-2020-15059
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.
CVE-2020-15060
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.
CVE-2020-15061
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to denial-of-service the device via long input values.
CVE-2020-15062
PUBLISHED: 2020-08-07
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.