Email Alerts
-
'Highly critical' flaw in RealPlayer, RealOne
An attacker could use a buffer overflow vulnerability in RealPlayer and RealOne Player to launch malicious code, but a fix is available. Article | 27 Oct 2004
-
Security Bytes: Microsoft Word, Office vulnerable to denial-of-service attack
In other news, Schmidt returns to government and hurricanes impact spam -- temporarily. Article | 08 Oct 2004
-
Havoc or hyperbole?
Some security experts call Microsoft's .jpg flaw a recipe for disaster attackers are ready to pounce on. Others say the threat has been hyped beyond reason. Article | 16 Sep 2004
-
Vulnerabilities found in WinZip
An attacker could use vulnerabilities in WinZip to execute arbitrary code or gain access to systems. Article | 03 Sep 2004
-
Red Hat says lha vulnerable to attack
Red Hat recommends users update their lha packages to solve vulnerabilities that can trigger a buffer overflow or launch arbitrary code. Article | 02 Sep 2004
-
Is your site vulnerable to SQL injection attacks?
SQL injection exploits may soon be as common as those targeting Windows and Unix flaws, experts say. An estimated 60% of Web applications that use dynamic content are likely vulnerable, with devastating consequences for an enterprise. Learn how to re... Article | 29 Jul 2004
-
Automated SQL injection: What your enterprise needs to know, part 2
The second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk. Article | 29 Jul 2004
-
New attacks and vulnerability trends highlighted at Black Hat
Presentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics. Article | 28 Jul 2004
-
Debian fixes multiple flaws
Denial-of-service, buffer overflow and format string vulnerabilities in Debian GNU/Linux that an attacker could use to remotely execute malicious code has been fixed. Article | 19 Jul 2004
-
Experts: IIS attack overblown, but still worrisome
Experts believe the scope of last week's Internet assault was overblown. But some worry it was merely a test run for a more destructive attack. Article | 01 Jul 2004
Security Management Strategies for the CIO