Users of IT security products should see no gaps in service resulting from floods in Britain, despite the location of several vendors in some of the worst-affected towns.
Google buys Postini to sell infosecurity as a service
Google is buying its way into the infosecurity market, through purchasing security service provider Postini for $625 million (£310m, EUR458m) in cash, it said on 9 July.
Infosec ignorance is a barrier to security in America’s Cup
This year, the Victory Challenge team introduced security into their game plan as they challenged the Swiss defender Alinghi, in the 32nd America’s Cup.
New web threats gain momentum
Eighty per cent of infected websites have been compromised by a third-party hacker, according to the latest threat statistics from Sophos.
Lloyds TSB turns fraud-detection software on staff
Lloyds TSB has purchased pattern-recognition software from US vendor Actimize for detecting employee fraud within its retail banking operation. Use of such software is already common in financial services for spotting fraud in external transactions, su…
One gang corners the market in phish
One gang is responsible for more than half of all attempted phishing for the likes of online banking log-in details, and has found ways to extend the lives of its web-sites, according to researchers at Cambridge University.
Microsoft Windows JPEG component buffer overflow
Systems Affected
This vulnerability affects the following
Microsoft Windows operating systems by default:
Microsoft Windows XP and Microsoft Windows XP Service Pack 1
Microsoft Windows XP 64-Bit Edition Service Pack 1
Microsoft Windows XP 64-Bit …
Vulnerability in Microsoft Image Processing Component
Systems Affected
Applications that process JPEG images on Microsoft Windows, including
but not limited to
Internet Explorer
Microsoft Office
Microsoft Visual Studio
Picture It!
Applications from other vendors besides Microsoft
Overview
An a…
Vulnerabilities in MIT Kerberos 5
Systems Affected
MIT Kerberos 5 versions prior to krb5-1.3.5
Applications that use versions of MIT Kerberos 5 libraries prior to krb5-1.3.5
Applications that contain code derived from MIT Kerberos 5
Updated vendor information is available in the s…
Multiple Vulnerabilities in Oracle Products
Systems Affected
The following Oracle applications are affected:
Oracle Database 10g Release 1, version 10.1.0.2
Oracle9i Database Server Release 2, versions 9.2.0.4 and 9.2.0.5
Oracle9i Database Server Release 1, versions 9.0.1.4, 9.0.1.5 and …