Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in January 2010
Black Hat DC: Researchers To Release Web Development Platform Hacking Tool
News  |  1/28/2010  | 
Tool tests for newly discovered class of vulnerabilities in popular Apache, Sun, Microsoft Web development platforms
Critical Infrastructure Vulnerable To Attack
News  |  1/28/2010  | 
A report finds widespread concern among IT security executives about cyber threats to industry networks.
China Denies Attacking Google
News  |  1/25/2010  | 
Officials in China call claims that the government had a role in the cyber attack on Google and other companies "groundless."
Consumer Awareness Of Online Threats Is Up, Study Says
Quick Hits  |  1/25/2010  | 
Users more worried about phishing, social networking threats, according to RSA
Microsoft Releases Critical Internet Explorer Patch
News  |  1/21/2010  | 
With exploit code already in circulation, Microsoft has made a planned February browser fix available immediately.
Inside IBM's Patent Applications For Airport Security
News  |  1/21/2010  | 
Technology has potential to apply profiling of passengers, alerting officials to potential terminal and tarmac threats
Researcher: Flaws In Facebook App Authorization Could Lead To Clickjacking
News  |  1/20/2010  | 
Vulnerabilities could enable attackers to collect data on Facebook users and friends, Dhanjani says
7 Steps For Protecting Your Organization From 'Aurora'
News  |  1/19/2010  | 
Microsoft patch is imminent, but here's a checklist for locking down in the meantime
'Aurora' Exploit Retooled To Bypass Internet Explorer's DEP Security
News  |  1/19/2010  | 
Microsoft plans possible emergency patch for exploit used in attacks on Google, others
Other Targets In Google Cyber Attack Surface
News  |  1/15/2010  | 
The U.S. has formally asked Chinese officials for an explanation; China says it welcomes companies that obey the law.
Google Attack Used Internet Explorer Flaw
News  |  1/14/2010  | 
McAfee Labs has identified a zero-day flaw in Internet Explorer and Microsoft has published a security advisory.
Facebook Partners With McAfee For Security
News  |  1/13/2010  | 
A free six-month security software subscription arrives just as a new Facebook attack technique debuts.
VMware To Buy Zimbra From Yahoo
News  |  1/13/2010  | 
The open-source email and collaboration software will be used to build out VMware's virtualization infrastructure for cloud computing environments.
Adobe, Microsoft, Oracle Release Security Fixes
News  |  1/12/2010  | 
The first "Patch Tuesday" of 2010 brings only one fix from Microsoft. But Adobe and Oracle have vulnerabilities to address too.
IETF Fix For SSL Protocol Complete
News  |  1/12/2010  | 
Security extension to the SSL/TLS protocol that protects against man-in-the middle attack is ready for prime time, security experts say
Kodak, Samsung End Patent Dispute
News  |  1/12/2010  | 
The settlement could lead to improved cameras in Samsung mobile phones.
About 1% Of Google Android Apps Bad
News  |  1/11/2010  | 
Google's Android Market has less oversight than Apple's iTunes App Store, and users are expected to police the store shelves.
More Researchers Going On The Offensive To Kill Botnets
News  |  1/11/2010  | 
Another botnet bites the dust, as more researchers looking at more aggressive ways to beat cybercriminals
Nexus One Users Report Poor 3G Access
News  |  1/11/2010  | 
Owners of the Google-branded smartphone say their connections are dropping from 3G to T-Mobile's slower Edge network.
IBM: Customer Stiffed Us For $1.7 Million
News  |  1/11/2010  | 
Big Blue lawsuit claims Wall Street firm BGC improperly obtained multiple copies of its Informix database software.
Researcher Rates Mac OS X Vulnerability 'High'
News  |  1/8/2010  | 
Flaw in versions 10.5 and 10.6 can be exploited by a remote attacker, says SecurityReason
Mac OS X Vulnerability Posted
News  |  1/8/2010  | 
The vulnerability is a variant of an issue raised last summer.
CES 2010 Photo Gallery
News  |  1/8/2010  | 
Here's our visual tour of the people and gadgets on display at this year's Consumer Electronics Show.
Adobe Fixes Critical Illustrator Flaw
News  |  1/7/2010  | 
An actively exploited vulnerability in Acrobat and Acrobat Reader will be addressed next week.
Survey: 54 Percent Of Organizations Plan To Add Smartphone Antivirus This Year
Quick Hits  |  1/7/2010  | 
In anticipation of increased mobile threats in the next year, 40 percent of organizations worldwide plan to recruit mobile security staff
Cyber Attack Simulation Planned Next Month
News  |  1/6/2010  | 
A financial sector group aims to help organizations learn how to respond when hit with a cyber attack.
Product Watch: Cisco Acquires Security Firm Founded By Cisco Alumni
News  |  1/6/2010  | 
Access management technology startup Rohati Systems will become part of Cisco's Nexus team
Researchers Infiltrate Storm Botnet Successor
News  |  1/5/2010  | 
Going undercover in Waledac botnet, European researchers discover it's much bigger than they thought
Web Filtering Company Sues China, PC Makers Over Green Dam
News  |  1/5/2010  | 
CYBERsitter, LLC, maker of the Internet filtering software of the same name, is seeking $2.2 billion in damages from China, two Chinese software makers and seven PC makers.


Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3278
PUBLISHED: 2021-01-26
Local Service Search Engine Management System 1.0 has a vulnerability through authentication bypass using SQL injection . Using this vulnerability, an attacker can bypass the login page.
CVE-2021-3285
PUBLISHED: 2021-01-26
jxbrowser in TI Code Composer Studio IDE 8.x through 10.x before 10.1.1 does not verify X.509 certificates for HTTPS.
CVE-2021-3286
PUBLISHED: 2021-01-26
SQL injection exists in Spotweb 1.4.9 because the notAllowedCommands protection mechanism is inadequate, e.g., a variation of the payload may be used. NOTE: this issue exists because of an incomplete fix for CVE-2020-35545.
CVE-2021-3291
PUBLISHED: 2021-01-26
Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
CVE-2021-3297
PUBLISHED: 2021-01-26
On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides administrator access.