News (Page 21 of 71)   < Prev  16 17 18 19 20 21 22 23 24 25 26  Next >
Plug-and-play bots worming and warring among Windows systems
A dozen different worms based on bot software have started attacking already-compromised Windows 2000 systems with the aim of creating a lasting bot net, security experts warn. Several companies, such as CNN and the New York Times, have been infected because they failed to patch in time.
By: Robert Lemos, SecurityFocus 2005-08-17
http://www.securityfocus.com/news/11285

Worm spreading through Microsoft Plug-and-Play flaw
Dubbed Zotob, the worm infects computers using a flaw in the Windows operating system's Plug-and-Play functionality, but security experts believe that the attack won't be as significant as previous epidemics.
By: Robert Lemos, SecurityFocus 2005-08-14
http://www.securityfocus.com/news/11281

NIST, DHS add national vulnerability database to mix
The National Institute of Standards and Technology has created a government-funded database of flaws. Will it bring more competition among vulnerability databases or just be a federally funded clone?
By: Robert Lemos, SecurityFocus 2005-08-12
http://www.securityfocus.com/news/11278

Microsoft's "monkeys" find first zero-day exploit
The software giant continues its honeymonkey research, finding more than 750 exploits for Windows computers, including an attack using a vulnerability that had not been publicly disclosed.
By: Robert Lemos, SecurityFocus 2005-08-08
http://www.securityfocus.com/news/11273

Annual hacking game teaches security lessons
At the DEF CON conference, the latest version of the weekend-long Capture the Flag game stresses code auditing as a measure of hacking skills, but also requires participants to think about balancing attack and defense as well as physical security.
By: Robert Lemos, SecurityFocus 2005-08-04
http://www.securityfocus.com/news/11269

Exploit writers team up to target Cisco routers
Security researchers and hackers, angered by Cisco attempts to quash a recent flaw finder's presentation, aim to reproduce and extend attacks on the networking giant's Internet products.
By: Robert Lemos, SecurityFocus 2005-07-31
http://www.securityfocus.com/news/11263

Reading, rooting, 'rithmetic: Preschoolers learn programming
One educator argues that kids should be taught computer programming and hacking skills from preschool to reinforce creativity and technology learning.
By: Robert Lemos, SecurityFocus 2005-07-30
http://www.securityfocus.com/news/11262

Settlement reached in Cisco flaw dispute
A researcher who showed off a way to remotely compromise Cisco routers has to turn over all materials and agreed not to further disseminate information on the flaws or the technique he used to run code on the popular network hardware.
By: Robert Lemos, SecurityFocus 2005-07-29
http://www.securityfocus.com/news/11260

Cisco, ISS file suit against rogue researcher
UPDATE: The two companies file a restraining against the management of the Black Hat Conference and a security expert who told conference attendees that attackers can broadly compromise Cisco routers.
By: Robert Lemos, SecurityFocus 2005-07-27
http://www.securityfocus.com/news/11259

3Com launches vulnerability-buying program
UPDATE: Under the Zero Day Initiative, 3Com plans to pay security researchers for information on vulnerabilities and award bonuses to prolific flaw finders.
By: Robert Lemos, SecurityFocus 2005-07-25
http://www.securityfocus.com/news/11253

News (Page 21 of 71)   < Prev  16 17 18 19 20 21 22 23 24 25 26  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus