Email Alerts
-
Updated: Symantec fixes DNS cache poisoning flaw
A vulnerability in Symantec Enterprise Firewall, Gateway Security and the VelociRaptor operating system could be exploited to poison the DNS cache. Article | 22 Jun 2004
-
DDoS attack targets Akamai
An attack on servers controlling Akamai's domain name service affected Yahoo, Google, Microsoft, FedEx, Xerox, Apple and likely others. Article | 16 Jun 2004
-
Drowning in buffer-overflow vulnerabilities
Building cars with gas tanks that explode on impact wasn't a good idea, and automakers eventually phased that feature out of their products. Software vendors could learn a lesson from that mistake, and deal with their own particular built-in security... Article | 24 May 2004
-
'Whispering keyboards' could be next attack trend
An IBM researcher's found a way to lift passcodes and other sensitive data by recording the sound of keystrokes. Article | 11 May 2004
-
Python vulnerability permits remote attacks
Thousands of applications, including large and mission critical systems, are vulnerable to a bug that could allow a remote attacker to execute arbitrary code or gain system access. Article | 11 Mar 2004
-
Multiple vulnerabilities leave millions of RealPlayer users open to attacks
Multiple vulnerabilities in the RealPlayer application can leave users open to buffer-overflow attacks if the upgrade isn't applied. Article | 06 Feb 2004
-
Dangerous, familiar application vulnerabilities top list
The Open Web Application Security Project has compiled its annual list of the top application development flaws. Chances are you'll find a buffer overflow or two on the list. Article | 27 Jan 2004
-
Two IBM DB2 flaws allow arbitrary code execution
IBM has alerted DB2 users to apply fixes for vulnerabilities in the relational database that could enable an attacker to execute code. Article | 06 Oct 2003
-
Buffer overflows top list of exploitable vulnerabilities
Internet Security Systems Inc. released its first Catastrophic Risk Index, a list of exploitable vulnerabilities that IT system and network administrators need to be aware of. Article | 01 Jul 2003
-
Check Point president: Application security next frontier
Next month, perimeter security pioneer Check Point Software Technologies celebrates its 10-year anniversary. Check Point has been an industry leader in firewall and virtual private network (VPN) technology, and last Monday it announced the release of... Interview | 15 May 2003
Security Management Strategies for the CIO