Lloyds TSB turns fraud-detection software on staff

Lloyds TSB has purchased pattern-recognition software from US vendor Actimize for detecting employee fraud within its retail banking operation. Use of such software is already common in financial services for spotting fraud in external transactions, su…

Read More >>

One gang corners the market in phish

One gang is responsible for more than half of all attempted phishing for the likes of online banking log-in details, and has found ways to extend the lives of its web-sites, according to researchers at Cambridge University.

Read More >>

Microsoft Windows JPEG component buffer overflow

Systems Affected

This vulnerability affects the following
Microsoft Windows operating systems by default:

Microsoft Windows XP and Microsoft Windows XP Service Pack 1

Microsoft Windows XP 64-Bit Edition Service Pack 1

Microsoft Windows XP 64-Bit …

Read More >>

Vulnerabilities in MIT Kerberos 5

Systems Affected

MIT Kerberos 5 versions prior to krb5-1.3.5
Applications that use versions of MIT Kerberos 5 libraries prior to krb5-1.3.5
Applications that contain code derived from MIT Kerberos 5

Updated vendor information is available in the s…

Read More >>

Multiple Vulnerabilities in Oracle Products

Systems Affected

The following Oracle applications are affected:

Oracle Database 10g Release 1, version 10.1.0.2

Oracle9i Database Server Release 2, versions 9.2.0.4 and 9.2.0.5

Oracle9i Database Server Release 1, versions 9.0.1.4, 9.0.1.5 and …

Read More >>

Security Improvements in Windows XP Service Pack 2

Systems Affected

Microsoft Windows XP

Overview

Microsoft Windows XP Service Pack 2 (SP2) significantly improves your computer’s defenses against attacks and vulnerabilities.

Recommendation

To help protect your Windows XP computer from att…

Read More >>

Multiple Vulnerabilities in libpng

Systems Affected

Applications and systems that use the libpng library.

Overview

Several vulnerabilities exist in the libpng library, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system.

Descr…

Read More >>