New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 990
Comments: 20
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Computer Cops: Security Hole

Search on This Topic:   
[ Go to Home | Select a New Topic ]

image Oh! Woe is me! More IE6 exploits discovered by JELMER,a dutch white hat hacker. image
Security Hole
TMOV writes "GOD help us all. A Dutch white hat hacker known asJELMER has discovered more serious openings in Internet Explorer and Outlook that are exploited by adware.
please see the rest of the story at The Register

TMOV"
Posted by Blast  on Friday, 11 June 2004 @ 08:10:54 EDT (279 reads)
(TrackBack (0) | comments? | Score: 0)
image

image Linux mail server antivirus benchmarks image
Security Hole
Anonymous writes "New LInux mail server Antivirus benchmarks and reviews on: www.benchmarks.dmz.ro
Cipri "
Posted by cj  on Wednesday, 09 June 2004 @ 09:00:28 EDT (179 reads)
(TrackBack (0) | comments? | Score: 0)
image

image 83% Of Financial Sector Admits Security Breaches image
Security Hole
May 28, 2004
By Gregg Keizer TechWeb News

Security attacks at major financial institutions more than doubled over a year ago, said a survey released Thursday of leading global banks, securities firms, and insurance companies.
Posted by IACOJ  on Saturday, 29 May 2004 @ 09:24:56 EDT (275 reads)
(» Read More... | 668 bytes more | TrackBack (0) | comments? | Score: 0)
image

image WeekEnd Feature: Blink and you’ll miss it image
Security Hole

WeekEnd Feature:
Blink and you’ll miss it










by Ian Thompson, CCSP Staff Editor
May 8, 2004


The world turns. Perhaps you’ve noticed this? Seasons change. Sun moves about a bit, and the moon trundles along its merry way. Some birds fly somewhere else for part of the year and whales swim thousands of miles and back again. This has absolutely nothing to do with security. But another thing that seems to run in cycles is the way that attack follows defence; the next threat after the last is not that far away these days…
Posted by phoenix22  on Saturday, 08 May 2004 @ 09:29:39 EDT (907 reads)
(» Read More... | 9863 bytes more | TrackBack (0) | 3 comments | WeekEnd Feature | Score: 5)
image

image Advisories!: Buffer overflow in Oracle Database image
Security Hole


Mistakes are a fact of life
It is the response to error that counts.
Nikki Giovanni (b. 1943); US poetess.

- Buffer overflow in Oracle Database -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, February 27, 2004 - SecuriTeam has warned of the existence of buffer
overflows in two functions used by versions 9ir2 and earlier of Oracle
Database Server, which could be used with PL/SQL to convert numbers to
date/time intervals.
Posted by phoenix22  on Sunday, 29 February 2004 @ 08:59:15 EST (317 reads)
(» Read More... | 1547 bytes more | TrackBack (0) | comments? | Advisories! | Score: 0)
image

image Beware!: Vulnerability in WinZip Could Compromise Security image
Security Hole




Vulnerability in WinZip Could Compromise Security
By Larry Seltzer
February 27, 2004


Security analysts on Friday reported that versions of the popular ZIP file management program WinZip have a serious security flaw.
Posted by phoenix22  on Friday, 27 February 2004 @ 19:16:12 EST (644 reads)
(» Read More... | 2129 bytes more | TrackBack (0) | comments? | Beware! | Score: 5)
image

image Firewalls: Check Point warns of firewall flaws image
Security Hole




Check Point warns of firewall flaws
By Robert Lemos
CNET News.com

Two flaws in Check Point Software's flagship firewall software could allow an attacker to crash or compromise its firewall products, the company said Wednesday.
Posted by phoenix22  on Thursday, 05 February 2004 @ 18:38:36 EST (337 reads)
(» Read More... | 2052 bytes more | TrackBack (0) | comments? | Firewalls | Score: 4)
image

image Beware!: RealPlayer flaws open PCs up to hijackers image
Security Hole




RealPlayer flaws open PCs up to hijackers
By Robert Lemos
CNET News.com
February 5, 2004, 12:43 PM PT

RealNetworks acknowledged on Wednesday that three flaws affecting different versions of its media player could allow attackers to create corrupt music or video files that, when played, take control of a victim's PC.
Posted by phoenix22  on Thursday, 05 February 2004 @ 18:24:44 EST (449 reads)
(» Read More... | 2379 bytes more | TrackBack (0) | comments? | Beware! | Score: 4)
image

image Vulnerabilities: Old vulnerabilities in new devices image
Security Hole
There is nothing that man fears more than the touch of the unknown.
Elias Canetti (1905-94); Austrian novelist and philosopher.

- Old vulnerabilities in new devices -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, December 23, 2003 - The number of peripheral devices which include
TCP/IP services for a range of functions, such as remote control, is
continually increasing. Today, in Oxygen3 24h-365d we will look at why, ...........................
Posted by phoenix22  on Thursday, 25 December 2003 @ 04:00:00 EST (416 reads)
(» Read More... | 1957 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 0)
image

image Beware!: IE fix mends flawed open-source patch image
Security Hole
IE fix mends flawed open-source patch
By Munir Kotadia
n/a
December 22, 2003, 9:54 AM PT

A Web site that published a third-party patch to fix a security hole in Microsoft's Internet Explorer has had to reissue the patch, after the original was found to be flawed.
Posted by phoenix22  on Tuesday, 23 December 2003 @ 04:25:00 EST (486 reads)
(» Read More... | 2741 bytes more | TrackBack (0) | comments? | Beware! | Score: 4)
image

Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication