News (Page 13 of 71)   < Prev  8 9 10 11 12 13 14 15 16 17 18  Next >
Targeted Trojan attacks on the rise
Attacks crafted to escape detection by antivirus software are increasingly being used to gain entrance into corporate networks.
By: Robert Lemos, SecurityFocus 2006-10-13
http://www.securityfocus.com/news/11418

Google Code Search peers into programs' flaws
Security professionals warn coders that they need to be aware that their open-source repositories are now searchable, allowing attackers to target programs that are likely to be flawed.
By: Robert Lemos, SecurityFocus 2006-10-06
http://www.securityfocus.com/news/11417

Mozilla flaws more joke than jeopardy
Two ToorCon presenters razz the open-source browser group for an alleged flawed implementation of Javascript, but the lecture appears to be more stand-up comedy than substantiative research.
By: Robert Lemos, SecurityFocus 2006-10-03
http://www.securityfocus.com/news/11416

Tag-team attack exploits IE flaw
Attackers exploit a zero-day vulnerability to cause a large number of Web sites to send their visitors to rogue pages carrying a second attack, this time against Microsoft's Internet Explorer.
By: Robert Lemos, SecurityFocus 2006-09-25
http://www.securityfocus.com/news/11415

HP chief apologizes, denies he knew of hacking
Hewlett-Packard's CEO Mark Hurd immediately replaces former chairperson Patricia Dunn as the company acknowledges it knew about the "pretexting" but not about the "hacking."
By: Robert Lemos, SecurityFocus 2006-09-22
http://www.securityfocus.com/news/11414

Web flaws race ahead in 2006
Less rigor in Web programming, a growing number of software projects, and restrictions on Web security testing are combining to make Web-site vulnerabilities the most common class of security issues this year.
By: Robert Lemos, SecurityFocus 2006-09-15
http://www.securityfocus.com/news/11413

HP's Dunn to step down amidst hacking scandal
Hewlett-Packard announces that the chairwoman will resign in January, while California's Attorney General and civil lawsuits aim to use cybercrime laws to reign in investigators that abused computer access to "pretext" the phone records of reporters and directors.
By: Robert Lemos, SecurityFocus 2006-09-12
http://www.securityfocus.com/news/11412

Security pro pleads guilty to USC breach
Eric McCarty agrees to a single felony charge of exploiting a flaw in the University of Southern California's online student application site and accessing confidential information.
By: Robert Lemos, SecurityFocus 2006-09-06
http://www.securityfocus.com/news/11411

Trusted computing a shield against worst attacks?
A report funded by computer firmware developer Phoenix Technologies finds that the ability to identify users' computers, a key capability of trusted computing hardware, could eliminate the most damaging digital attacks.
By: Robert Lemos, SecurityFocus 2006-08-31
http://www.securityfocus.com/news/11410

Linux update becomes terminal pain
Users of the increasingly popular Ubuntu distribution find themselves having to deal with the command-line terminal after an update breaks the graphical X Windows subsystem.
By: Robert Lemos, SecurityFocus 2006-08-24
http://www.securityfocus.com/news/11409

News (Page 13 of 71)   < Prev  8 9 10 11 12 13 14 15 16 17 18  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus