Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in November 2008
U.S. Army Goes Bot Hunting
News  |  11/26/2008  | 
As an automated network-flow analysis tool, BotHunter uses IDS routines to scan inbound and outbound network packet headers and payloads.
Nightmare Before Christmas: Researchers Warn Of Holiday Shopping Threats
News  |  11/26/2008  | 
Increases in malware, enterprise vulnerabilities, laptop theft expected
Facebook Wins $873 Million Judgment Against Spammer
News  |  11/24/2008  | 
The penalty is the largest award yet under the 2003 Can-Spam Act.
China Targets U.S. Computers For Espionage, Report Warns
News  |  11/20/2008  | 
The 2008 Annual Report to Congress urges tighter computer security measures to prevent data loss or corruption.
IT Security's Next Big Threat: Young People
News  |  11/19/2008  | 
Generation Y user behavior could endanger security of enteprise systems, studies say
Broadband Explosion in China And India To Fuel Bots, Spam
News  |  11/19/2008  | 
Botnets to cast wider geographic net, more widely adopt stealthy fast-flux technology, researcher says
Microsoft To Offer Free Security Software
News  |  11/19/2008  | 
Morro will replace the subscription Windows Live OneCare service starting next year.
Anti-Virus Vendor Makes Amends For PC-Breaking Snafu
News  |  11/14/2008  | 
The problem started Nov. 9 when AVG released a virus signature update that misidentified the user32.dll file, a core Windows XP file, as a Trojan.
Researchers Find Flaws In Microsoft VoIP Apps
News  |  11/14/2008  | 
Vulnerabilities could lead to denial-of-service attacks, researchers say
Employees' Online Shopping Could Threaten Company Security
Quick Hits  |  11/14/2008  | 
Younger employees say they plan to spend as much as five work hours shopping for the holiday season
Hosting King Of Spam And Botnets Shut Down, For Now
Quick Hits  |  11/13/2008  | 
McColo's fall results in a brief holiday from spam and botnet activity, but don't get used to it, researchers say
Antivirus Vendor's Snafu Breaks Users' PCs
News  |  11/11/2008  | 
AVG customers that unknowingly deleted the user32.dll file ended up with a PC that either wouldn't reboot or would go into an endless reboot cycle.
Microsoft's November Patch Tuesday Unusually Light
News  |  11/11/2008  | 
The lone critical vulnerability affects Microsoft XML Core Services and, left unchecked, could allow remote code execution if the user visits a maliciously crafted Web page.
25% Of DNS Servers Still Vulnerable To Kaminsky Flaw
News  |  11/11/2008  | 
Security researchers say that DNS will remain a primary exploit target because many people don't understand the Internet's domain name system.
ISPs Facing More Service-Level Attacks
Quick Hits  |  11/11/2008  | 
DDoS attacks hit 40Gbps, but it's the lower-profile attacks that most worry service providers, according to Arbor's new Wordwide Infrastructure Security Report
Many DNS Servers Still Vulnerable To Attack
Quick Hits  |  11/10/2008  | 
One-quarter of DNS servers are still not patched against cache poisoning, study says
Don't Blame TCP/IP
News  |  11/10/2008  | 
Recently disclosed threats to the Internet's IP infrastructure turn spotlight on the protocols -- but protection hinges more on politics and business than technology
Keys To Success Of Vulnerability Management
News  |  11/6/2008  | 
Follow these four principles: focus on output, align with business processes, integrate technologies, and leverage measurement.
Vulnerability Management That Works
News  |  11/6/2008  | 
IT must align its program with business values in order to succeed.
Obama, McCain Campaign Computers Hacked
News  |  11/5/2008  | 
Tech experts at the Obama headquarters initially believed that the computer systems had been invaded by a computer virus.
Web 2.0 Summit: Google, Wikipedia's Tips On Thwarting Spam Abuse
News  |  11/5/2008  | 
Panelists suggest using spam filtering services, "no follow" links, CAPTCHAs, patching religiously, and possibly even charging money to deter spammer registrations.
Virtual Worlds Riskier in Financial Crisis
News  |  11/5/2008  | 
Criminals 'follow the money' to where virtual and real-world economies converge
Adobe Issues Patch for Critical Reader Flaw
Quick Hits  |  11/4/2008  | 
Critical vulnerability could be used to exploit JavaScript engine in popular Reader application
Online Auction for Vulnerabilities Mulls Shutdown
News  |  11/4/2008  | 
WabiSabiLabi is considering closing the online marketplace for security vulnerabilities as it focuses on new line of unified threat management (UTM) appliances
Worm Exploiting Microsoft Windows Server Spotted
News  |  11/3/2008  | 
The vulnerability, which could allow a remote attacker to take over Windows computers without any user interaction, taps into the recent Microsoft Security Bulletin MS08-067.
Lock-Picking Made Easy: New Key Duplication Tool Demonstrates Physical Security Risk
Quick Hits  |  11/3/2008  | 
UC-San Diego researchers show that a photograph is all you need to duplicate a key
Sneaky Malware Hard to Kill
News  |  11/3/2008  | 
Microsoft's new Security Intelligence Report finds Trojan downloaders/droppers are on the rise, while viruses decline
Google Patches Android Security Flaw
News  |  11/3/2008  | 
The company's over-the-air update fixes a browser vulnerability that could enable hackers to gain access to information like saved passwords.
Microsoft: Malware Threats Up 43%
News  |  11/3/2008  | 
The software maker says that the spread of unwanted software is growing faster than ever.


Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: How do you like our new spear phishing email solution?
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprise
Assessing Cybersecurity Risk in Today's Enterprise
Security leaders are struggling to understand their organizations risk exposure. While many are confident in their security strategies and processes, theyre also more concerned than ever about getting breached. Download this report today and get insights on how today's enterprises assess and perceive the risks they face in 2019!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18881
PUBLISHED: 2019-11-12
WSO2 IS as Key Manager 5.7.0 allows unauthenticated reflected XSS in the dashboard user profile.
CVE-2019-18882
PUBLISHED: 2019-11-12
WSO2 IS as Key Manager 5.7.0 allows stored XSS in download-userinfo.jag because Content-Type is mishandled.
CVE-2019-18873
PUBLISHED: 2019-11-12
FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the pa...
CVE-2019-18874
PUBLISHED: 2019-11-12
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
CVE-2019-18862
PUBLISHED: 2019-11-11
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.