Email Alerts
-
Security updates fix Macromedia flaws
Attackers could exploit vulnerabilities to bypass security controls, gain administrative privileges and cause a denial-of-service. But fixes are available. Article | 19 Dec 2005
-
Roundup: 2005's 'curious malicious code'
These viruses, worms and Trojans sometimes escaped our notice. But it didn't get past one antivirus vendor, who rounded up some of the year's stranger offerings from the underground. Article | 15 Dec 2005
-
Flaws reported in Trend Micro ServerProtect
Storage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available. Article | 15 Dec 2005
-
Microsoft issues critical fix for IE
In addition to the long-awaited browser fix, the software giant also addressed an "important" Windows kernel flaw involving how certain procedure calls are processed. Article | 13 Dec 2005
-
Apple patches 13 flaws in Mac OS X
Attackers could gain unauthorized system access, compromise sensitive data and launch malcode by exploiting a series of security holes in Mac OS X. But patches are available. Article | 30 Nov 2005
-
Exploit code targets IE memory corruption flaw
Update: Security experts warn of proof-of-concept code for a memory corruption flaw in Internet Explorer. One firm recommends disabling Active Scripting, and explains how. Article | 21 Nov 2005
-
Security Bytes: FTC cracks down on alleged spyware distributors
Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion suffers... Article | 11 Nov 2005
-
Security Bytes: Did adware maker help bust botnet?
Elsewhere: Juniper hires a controversial researcher while vulnerabilities plague Macromedia Flash Player 7 and Apple QuickTime. Article | 07 Nov 2005
-
Bots in the A/C, spyware in the 'fridge
Someday, hackers will target the computers in your air conditioner, refrigerator and TV. What can security professionals do about it? Article | 31 Oct 2005
-
Powerful payloads: The evolution of exploit frameworks
Attackers have new tools to launch faster, more powerful attacks. Contributor Ed Skoudis offers up some examples, some of which are very clever and very evil. Article | 19 Oct 2005
Security Management Strategies for the CIO