Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in October 2012
Page 1 / 2   >   >>
Shopping The Russian Cybercrime Underground
News  |  10/30/2012  | 
Inside look at the wide range of hacking and related services being offered in the Russian-speaking cybercrime marketplace illustrates its maturity and popularity
Hackers Trade Tips On DDoS, SQL Injection
News  |  10/30/2012  | 
Study of hacker bulletin boards reveals focus on attack techniques, tips for beginning hackers, buying and selling of fake social network endorsements.
Supply Chain Woes: Human Error Or Something Else Entirely?
Commentary  |  10/28/2012  | 
How easy are plausibly deniable bugs really introduced to the supply chain, and are recent fears concerning foreign technologies more hype than fact?
Monitoring To Detect The Persistent Enemies
News  |  10/26/2012  | 
Subtle attackers who are after intellectual property are hard to find. Monitoring can help, but a good analyst can help even more
Frankenstory: Attack Of The Iranian Cyber Warriors
Commentary  |  10/26/2012  | 
Citing no hard evidence, U.S. government officials have been stoking fears that the Iranians are out to get us.
Fast Flux Botnet Nets Fraudsters $78 Million
News  |  10/26/2012  | 
Security report offers new details on financial hackers, warns that automated clearing house payment channels could be next target of increasingly sophisticated attacks.
Antivirus Tool Fail: Blocking Success Varies By 58%
News  |  10/25/2012  | 
Only two of 13 endpoint security software scanners blocked more than 80% of known exploits, NSS Labs study reports.
Huawei Proposes Security Test Center
News  |  10/24/2012  | 
In a bid to address regulators' security fears, Chinese telecom company Huawei wants to establish a cyber security test center in Australia.
U.S. Bank Hackers Promise DDoS Pause
News  |  10/24/2012  | 
In the sixth week since the launch of "Operation Ababil" attacks against Wall Street banks, online post says hacktivists are taking time off for a Muslim holiday.
Election 2012 Hacking Threat: 10 Facts
News  |  10/24/2012  | 
Election technology has improved since the 2000 presidential election "hanging chad" debacle, but new and old threats may put your vote at risk.
Hunting Botnets On A Bigger Scale
News  |  10/23/2012  | 
Researchers build prototype botnet detection system that gathers a big-picture view of both known and unknown botnet activity
Russian Service Rents Access To Hacked Corporate PCs
News  |  10/23/2012  | 
Service provides stolen remote desktop protocol credentials, letting buyers remotely log in to corporate servers and PCs, bypassing numerous security defenses.
Who Is Hacking U.S. Banks? 8 Facts
Slideshows  |  10/22/2012  | 
Hackers have labeled the bank website disruptions as grassroots-level reprisal for an anti-Islamic film. But is the Iranian government really backing the attacks?
Possible 'Patch' For Policy On Protecting Government Agency Systems
News  |  10/22/2012  | 
CSIS report due tomorrow will recommend revising a longtime OMB policy with 'continuous monitoring' of government systems and networks
Five Habits Of Companies That Catch Insiders
News  |  10/22/2012  | 
A survey of 40 companies that have successfully dealt with insider threats shows that the solution is less technology and more psychology
Popular Android Apps Vulnerable
News  |  10/22/2012  | 
Security study finds flawed SSL implementations in more than 1,000 Android apps.
Gartner: Supply Chain To Become A Top-Three Security Concern
Quick Hits  |  10/20/2012  | 
Integrity of data passed between hardware, software, and information suppliers will be a key security issue by 2017, research firm says
Tech Insight: What Penetration Testers Find Inside Your Network
News  |  10/19/2012  | 
Inside flaws include unpatched systems, open file shares or information stores, and lack of proper network segmentation
Zero-Day Attacks Long-Lived, Presage Mass Exploitation
News  |  10/18/2012  | 
Zero-day attacks escape detection for an average of 10 months; once they go public, attacks multiply dramatically, researchers find
Apple Removes Default Java Support In Browsers
News  |  10/18/2012  | 
Some Java security headache relief for Mac users
After Benghazi, State Dept. Seeks Diplomat Tracking Technologies
News  |  10/18/2012  | 
Following deadly attacks on diplomatic facilities in Libya, the Department of State wants new technology to track employees working in the field.
Google Helps Webmasters Disavow Spammy Links
News  |  10/17/2012  | 
New Disavow tool gives website owners a way to distance their sites from linkspam.
What Huawei, ZTE Must Do To Regain Trust
Commentary  |  10/16/2012  | 
The U.S. is not the only country scrutinizing the security of Chinese-made telecom equipment from Huawei and ZTE. Without major changes, significant contracts are at risk.
Meet Flame Espionage Malware Cousin: MiniFlame
News  |  10/16/2012  | 
Suspected Flame module turns out to be standalone attack code in use since at least 2010, described as targeted cyberweapon for conducting in-depth surveillance and espionage.
Bank Hacks: Iran Blame Game Intensifies
News  |  10/15/2012  | 
Wells Fargo official says scale of the attacks was "pretty significant." Is this the face of "cyberwar"?
Should You Buy From Huawei?
Commentary  |  10/15/2012  | 
Congress says U.S. companies should not purchase products from Chinese firms Huawei and ZTE, citing national security concerns. I say Congress is dealing more in fear than facts.
6 Reasons iOS 6 Jailbreaks Will Be Tough
News  |  10/12/2012  | 
Glory hounds hoping to jailbreak Apple's newest devices won't have an easy time of it. Security experts detail the challenges.
DOD: Hackers Breached U.S. Critical Infrastructure Control Systems
News  |  10/12/2012  | 
Defense secretary Leon Panetta says cyberattacks against critical infrastructure at home and abroad--some of which he called the worst to date--should spark urgent action against the hacker threat.
U.S. Bank Hacks Expand; Regions Financial Hit
News  |  10/12/2012  | 
Attacks by self-described Muslim hackers, now in their fourth week, hit Regions Financial Thursday. Hacking campaign has also disrupted Capital One and SunTrust banking websites.
Popular RATs Found Riddled With Bugs, Weak Crypto
News  |  10/11/2012  | 
Research by former interns for Matasano Security exposes flaws in remote administration tools
Hackers Launch New Wave Of U.S. Bank Attacks
News  |  10/11/2012  | 
Hacker group disrupts Capital One, SunTrust websites, compares its campaign against anti-Muslim movie to Kate Middleton's suit against a French magazine.
Mozilla Suspends Firefox 16 Downloads: Serious Bug
News  |  10/11/2012  | 
Mozilla warns that Firefox 16 contains significant vulnerability, plans to offer patched version for download as soon as possible.
Mild-Mannered Malware Sleuth Rocks Security
News  |  10/10/2012  | 
Botnet and malware expert Joe Stewart chats up his self-taught skill of picking apart malware and botnets, how targeted companies are in denial, Metallica -- and his raucous rock 'n' roll years
Appthority Cuts Through Enterprise Mobility Chaos
News  |  10/10/2012  | 
Startup pitches its tech for simplifying mobile app and device management. Check out our video coverage from InformationWeek 500 and Valley View.
Web API Allows Phishing Attack
News  |  10/10/2012  | 
A recent addition to HTML5, the Fullscreen API, appears to be easily abused.
Clear Ballot's Mission: Fast Audits Of Election Results
News  |  10/10/2012  | 
Software audits voting results in time for elections officials to fix problems before results are certified. Trials begin in Florida, New York, and New Hampshire in November.
Microsoft: Software Activation-Key Generators Major Malware Conduits
News  |  10/9/2012  | 
Lure of free software often leads to malware infection, new Security Intelligence Report finds
Windows 7 Malware Infection Rates Soar
News  |  10/9/2012  | 
Microsoft reports malware infections grow more prevalent on Windows 7 SP1 and Windows XP SP3 machines, while plummeting on Windows Vista SP2.
RSA Launches Database Breach Prevention Tool
News  |  10/9/2012  | 
Distributed Credential Protection randomizes, scrambles, and splits passwords between two servers to help block criminals or hacktivists from stealing username and password databases.
Mobile Trojans Can Give Attackers An Inside Look
News  |  10/8/2012  | 
A spate of research into mobile devices as sensor platforms has shown that compromised smartphones can be turned into insiders -- eavesdropping on phone calls, 'shoulder-surfing' for passwords, or looking around an office
Why Huawei Has Congress Worried
News  |  10/8/2012  | 
Congressional report says increasing dominance of Huawei and ZTE in telecom equipment market gives China an opportunity to spy or conduct malicious activities. If Stuxnet worked, what else will?
Does Mobile Antivirus Software Really Protect Smartphones?
News  |  10/8/2012  | 
Bad news: Many mobile antivirus apps are useless. Here's what mobile device management and mobile application management experts say you should focus on instead.
Cybercrime Attacks, Costs Escalating
News  |  10/8/2012  | 
Successful attacks against U.S. businesses have increased by 42% since last year, with individual businesses being hit with an average of two attacks per week, says study from Ponemon Institute and HP.
Tech Insight: The Most Common Vulnerabilities Found By Penetration Tests
News  |  10/5/2012  | 
Professional pen testers share which holes they find the most in clients' networks
Bank Hacks: 7 Misunderstood Facts
News  |  10/5/2012  | 
As security researchers review recent bank hacks--affecting Bank of America, JPMorgan Chase, PNC, U.S. Bank, and Wells Fargo--claims made by supposed hacktivists don't all add up.
Weaponized Bugs: Time For Digital Arms Control
Commentary  |  10/5/2012  | 
Thriving trade in zero-day vulnerabilities means dangerous bugs get sold to the highest bidder, and that puts everyone else at risk.
Serious Attackers Paired With Online Mob In Bank Attacks
News  |  10/4/2012  | 
The denial-of-service attacks chalked up to crowdsourced hacktivism had little impact, except to camouflage much more effective packet floods using compromised content-management servers
Botnet Spotted Silently Scanning IPv4 Address Space For Vulnerable VoIP
News  |  10/4/2012  | 
Researchers use 'network telescope' to peer into Sality botnet's underground activities
FTC Disconnects Tech Support Telemarketing Scams
News  |  10/4/2012  | 
Federal Trade Commission complaint names six businesses with operations in U.S. and India that tricked consumers into spending hundreds of dollars on bogus technical support.
Fake Antivirus Ringleader Must Pay $163 Million
News  |  10/3/2012  | 
Federal court imposes $163 million judgment on a woman who FTC says helped run scareware ring that tricked more than one million consumers across six countries into purchasing fake security software.
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.