New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 20)
· Marcia's (QA2)
· Bill G's (CO9)
· Paul's (AR 5)
· Robin's (AR 1)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 565
Comments: 14
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image cybsec: Weekly Summaries: Weekly summary image
Cyber Security


Examine what is said, not him who speaks.
Arab proverb.

- Weekly summary -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, May 22 2004 - Over the last week, Oxygen3 24h-365d has covered the
following issues, summarized below and which can be read at:
http://www.pandasoftware.com/about/press/oxygen3/oxygen.asp

- Denial of service in wireless devices (05/17/04).
A vulnerability in the WLAN 802.11 protocol could allow network traffic to
be disrupted using a low powered Wi-Fi device. This security flaw, which
exists in all hardware implementations of the wireless network protocol
IEEE802.11, allows an attack against the availability of wireless local area
network devices.

- Buffer overflow in Microsoft Visual Basic (05/18/04).
A buffer overflow vulnerability exists in Microsoft Visual Basic, which may
allow an attacker to create applications that could elevate privileges. One
of the normal consequences of the buffer overflow is a denial of service,
which although it hasn't been confirmed, could also be used to run arbitrary
code.

- Authentication flaw affecting Sun Java Secure Socket Extension (JSSE)
(05/19/04).
There is an authentication vulnerability which affects Sun JSSE extensions
and can cause the programs that use it to incorrectly validate digital SSL
server certificates. The versions affected are JSSE 1.0.3, 1.0.3_01 and
1.0.3_02 for Windows, Solaris and Linux. To avoid the problem, the company
has released version JSSE 1.0.3_03 in which the security hole has been
fixed.

- Critical security patch for CVS (05/20/04).
A critical vulnerability has been discovered in CVS (Concurrent Versions
Systems), the widely used software for developing and controlling open
source projects. The vulnerability detected stems from a buffer overrun
which could -potentially- allow an attacker to run arbitrary code on the
affected CVS servers.

- Intrusions in financial companies (05/21/04).
According to the Global Security Survey carried out by Deloitte, many of
the intrusions on financial institutions caused financial losses. However,
although attacks are on the increase, one in four companies said that their
IT security budgets were frozen. Eighty-three percent of respondents
admitted that their systems had been compromised during the last year, a
much higher figure than that of the previous year(39%).

NOTE: The address above may not show up on your screen as a single line.
This would prevent you from using the link to access the web page. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.
Posted on Sunday, 23 May 2004 @ 10:43:04 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Linux.com
· Microsoft
· Microsoft
· HotScripts
· W3 Consortium
· More about Cyber Security
· News by phoenix22


Most read story about Cyber Security:
Booby Trapped software!

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register