Several vendors release patches after vulnerabilities are found by Protos.
The ability to embed malware in Office documents might provide a new avenue for hackers to exploit.
Microsoft is diligent compared to these vendors who release their fixes a year after the fact.
Overflow in the "content-type" field of the message header seems to be the culprit of the CDO vulnerability.
Various factors need to align for serious damage to be done.
An e-mail targetting the CDO for buffer overflow can cripple a secured Exchange Server.
Swedish bank Nordea's customers are scammed by phishers targeting the bank's online authentication method.
Hackers go phishing at the U.S. Treasury Department.
Advice for pursuing a security career straight from the graduation line.
- By Greg Neilson
- 10/20/2005
A vulnerability in domain name support allows the bad guys to set up pretty good phishing sites.
More products are added to Check Point's SecurePlatform Firewall vulnerability warning.
The latest Windows vulnerability alert might be like preaching to a bored choir.
A security researcher gets his 15 minutes of fame on a mixed signal of confusion.
The U.S. government looks for a few good hackers at the DefCon security conference.
A recent Windows PnP vulnerability is hyped to be more dangerous than it really is.