Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in November 2008
U.S. Army Goes Bot Hunting
News  |  11/26/2008  | 
As an automated network-flow analysis tool, BotHunter uses IDS routines to scan inbound and outbound network packet headers and payloads.
Nightmare Before Christmas: Researchers Warn Of Holiday Shopping Threats
News  |  11/26/2008  | 
Increases in malware, enterprise vulnerabilities, laptop theft expected
Facebook Wins $873 Million Judgment Against Spammer
News  |  11/24/2008  | 
The penalty is the largest award yet under the 2003 Can-Spam Act.
China Targets U.S. Computers For Espionage, Report Warns
News  |  11/20/2008  | 
The 2008 Annual Report to Congress urges tighter computer security measures to prevent data loss or corruption.
IT Security's Next Big Threat: Young People
News  |  11/19/2008  | 
Generation Y user behavior could endanger security of enteprise systems, studies say
Broadband Explosion in China And India To Fuel Bots, Spam
News  |  11/19/2008  | 
Botnets to cast wider geographic net, more widely adopt stealthy fast-flux technology, researcher says
Microsoft To Offer Free Security Software
News  |  11/19/2008  | 
Morro will replace the subscription Windows Live OneCare service starting next year.
Anti-Virus Vendor Makes Amends For PC-Breaking Snafu
News  |  11/14/2008  | 
The problem started Nov. 9 when AVG released a virus signature update that misidentified the user32.dll file, a core Windows XP file, as a Trojan.
Researchers Find Flaws In Microsoft VoIP Apps
News  |  11/14/2008  | 
Vulnerabilities could lead to denial-of-service attacks, researchers say
Employees' Online Shopping Could Threaten Company Security
Quick Hits  |  11/14/2008  | 
Younger employees say they plan to spend as much as five work hours shopping for the holiday season
Hosting King Of Spam And Botnets Shut Down, For Now
Quick Hits  |  11/13/2008  | 
McColo's fall results in a brief holiday from spam and botnet activity, but don't get used to it, researchers say
Antivirus Vendor's Snafu Breaks Users' PCs
News  |  11/11/2008  | 
AVG customers that unknowingly deleted the user32.dll file ended up with a PC that either wouldn't reboot or would go into an endless reboot cycle.
Microsoft's November Patch Tuesday Unusually Light
News  |  11/11/2008  | 
The lone critical vulnerability affects Microsoft XML Core Services and, left unchecked, could allow remote code execution if the user visits a maliciously crafted Web page.
25% Of DNS Servers Still Vulnerable To Kaminsky Flaw
News  |  11/11/2008  | 
Security researchers say that DNS will remain a primary exploit target because many people don't understand the Internet's domain name system.
ISPs Facing More Service-Level Attacks
Quick Hits  |  11/11/2008  | 
DDoS attacks hit 40Gbps, but it's the lower-profile attacks that most worry service providers, according to Arbor's new Wordwide Infrastructure Security Report
Many DNS Servers Still Vulnerable To Attack
Quick Hits  |  11/10/2008  | 
One-quarter of DNS servers are still not patched against cache poisoning, study says
Don't Blame TCP/IP
News  |  11/10/2008  | 
Recently disclosed threats to the Internet's IP infrastructure turn spotlight on the protocols -- but protection hinges more on politics and business than technology
Keys To Success Of Vulnerability Management
News  |  11/6/2008  | 
Follow these four principles: focus on output, align with business processes, integrate technologies, and leverage measurement.
Vulnerability Management That Works
News  |  11/6/2008  | 
IT must align its program with business values in order to succeed.
Obama, McCain Campaign Computers Hacked
News  |  11/5/2008  | 
Tech experts at the Obama headquarters initially believed that the computer systems had been invaded by a computer virus.
Web 2.0 Summit: Google, Wikipedia's Tips On Thwarting Spam Abuse
News  |  11/5/2008  | 
Panelists suggest using spam filtering services, "no follow" links, CAPTCHAs, patching religiously, and possibly even charging money to deter spammer registrations.
Virtual Worlds Riskier in Financial Crisis
News  |  11/5/2008  | 
Criminals 'follow the money' to where virtual and real-world economies converge
Adobe Issues Patch for Critical Reader Flaw
Quick Hits  |  11/4/2008  | 
Critical vulnerability could be used to exploit JavaScript engine in popular Reader application
Online Auction for Vulnerabilities Mulls Shutdown
News  |  11/4/2008  | 
WabiSabiLabi is considering closing the online marketplace for security vulnerabilities as it focuses on new line of unified threat management (UTM) appliances
Worm Exploiting Microsoft Windows Server Spotted
News  |  11/3/2008  | 
The vulnerability, which could allow a remote attacker to take over Windows computers without any user interaction, taps into the recent Microsoft Security Bulletin MS08-067.
Lock-Picking Made Easy: New Key Duplication Tool Demonstrates Physical Security Risk
Quick Hits  |  11/3/2008  | 
UC-San Diego researchers show that a photograph is all you need to duplicate a key
Sneaky Malware Hard to Kill
News  |  11/3/2008  | 
Microsoft's new Security Intelligence Report finds Trojan downloaders/droppers are on the rise, while viruses decline
Google Patches Android Security Flaw
News  |  11/3/2008  | 
The company's over-the-air update fixes a browser vulnerability that could enable hackers to gain access to information like saved passwords.
Microsoft: Malware Threats Up 43%
News  |  11/3/2008  | 
The software maker says that the spread of unwanted software is growing faster than ever.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15216
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
CVE-2020-4607
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...