Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in November 2013
Page 1 / 2   >   >>
Automation, Exercises Shorten Response Time To Advanced Attacks
News  |  11/27/2013  | 
Detecting threats remains a problem, but companies need to improve incident response -- automation can help significantly
NSA Surveillance Fallout Costs IT Industry Billions
News  |  11/27/2013  | 
Analysts predict US tech companies may lose $180 billion by 2016 due to international concerns about intelligence agencies' spying.
Bitcoin Thefts Surge, DDoS Hackers Take Millions
News  |  11/27/2013  | 
Cryptographic currency's massive rise in value leads to a corresponding increase in online heists by criminals seeking easy paydays.
Presidential Council Calls For Feds And ISPs To Step Up In Cybersecurity
News  |  11/26/2013  | 
New report to President Obama says feds 'rarely follow' security best practices
Microsoft Office 365 Encrypted Email On Tap
News  |  11/26/2013  | 
Microsoft Office 365 Message Encryption feature will encrypt all messages by default, though recipients will need an Office 365 or Microsoft Account ID to read the mail.
Dataium Settles Browser History Sniffing Charges
News  |  11/26/2013  | 
The car buyer tracking firm was accused of using JavaScript to illegally identify websites visited by 181,000 named consumers, and selling harvested information.
What IT Can Teach Utilities About Cybersecurity & Smart Grids
Commentary  |  11/26/2013  | 
Protecting smart grids from cyber attack is a popular conversation in information security circles. But the threats are far worse than generally believed.
LG Admits Smart TVs Spied On Users
News  |  11/22/2013  | 
LG admits it collected information on consumers' viewing habits, promises firmware update to honor opt-out requests.
Google Settles With State AGs On Privacy
News  |  11/22/2013  | 
Google agrees to pay $17 million to 37 states to settle claims it circumvented cookie-blocking controls in Apple's Safari browser.
Spamhaus Shows What's Next For Block Listing
Commentary  |  11/22/2013  | 
The broad, silent acceptance of a recent Spamhaus blocking action is a strong indicator that the rules have changed in the battle over spam and other kinds of email abuse.
Financial Services Industry Proposes Security Controls For Third-Party, Open-Source Software
News  |  11/21/2013  | 
FS-ISAC addresses potential dangers of insecure software components used by financial firms
'i2Ninja' Trojan Taps Anonymized Darknet
News  |  11/21/2013  | 
New malware being sold via underground Russian cybercrime markets uses decentralized, anonymizing P2P system.
Study: Most Application Developers Don't Know Security, But Can Learn
Quick Hits  |  11/21/2013  | 
Solid training of app developers can reduce vulnerabilities, Denim Group study says
Healthcare.gov Security Hiccups
Commentary  |  11/20/2013  | 
Take two aspirin and call me in the morning
Close HealthCare.gov For Security Reasons, Experts Say
News  |  11/20/2013  | 
Testifying before the House technology committee, four security experts advise would-be HealthCare.gov users to steer clear of the site, pending security improvements.
Cupid Concedes January Hack, 42 Million Passwords Stolen
News  |  11/20/2013  | 
Separately, Github forces some users to reset weak passwords following a rapid attack launched via 40,000 IP addresses.
Mobile App Security: 5 Frequent Woes Persist
News  |  11/20/2013  | 
HP Fortify study finds five frequent problems that make mobile apps vulnerable, recommends simple-to-implement information security fixes.
SMBs Unsure And At Risk, Survey Finds
Quick Hits  |  11/19/2013  | 
New study highlights uncertainty among small to midsize businesses on cyberattacks, threats
iPhone Photo Leads To Cybercrime Arrest
News  |  11/19/2013  | 
The FBI uses an iPhone photo to nab six members of a cybercrime ring accused of stealing $45 million via ATMs.
Understanding IT Risk Management In 4 Steps X 3
Commentary  |  11/19/2013  | 
A risk management matrix combines the probability of harm and the severity of harm. In IT terms that means authentication, context, and process.
iOS Mobile Point-of-Sale Fail
News  |  11/18/2013  | 
Trendy 'i' mobile payment systems often rolled out with major security flaws, researcher says
vBulletin.com Hacked, Customer Data Stolen
News  |  11/18/2013  | 
"Inj3ct0r Team" hackers claim they employed vBulletin zero-day bug to take down both vBulletin.com and MacRumors, offer to sell related exploit.
FBI Blames Federal Hacks On Anonymous Campaign
News  |  11/18/2013  | 
A British suspect is accused of attacking numerous government agencies, including the U.S. Army and NASA.
Authentication + Mobile Phone = Password Killer
Commentary  |  11/18/2013  | 
Can the smartphone free us from the drudgery of the much-despised password? There's good reason to hope.
BYOD: 'We Have Met the Enemy & He Is Us'
Commentary  |  11/18/2013  | 
As smartphone adoption continues at an unrelenting pace, the issues surrounding BYOD will become an even more challenging mobile security management issue.
Facebook Forces Some Users To Reset Passwords
News  |  11/17/2013  | 
Facebook is asking users whose passwords might have been exposed on other sites to change their passwords to access the social network.
Kelihos Botnet Thrives, Despite Takedowns
News  |  11/17/2013  | 
Fast flux infrastructure and Windows XP infections continue to keep the botnet alive.
4 Lessons From MongoHQ Data Breach
News  |  11/15/2013  | 
Security experts urge companies to implement two-factor authentication, VPNs, and graduated permission levels to better protect customer data from hackers.
Microsoft May Encrypt All Server-To-Server Communications
News  |  11/15/2013  | 
Microsoft admits it doesn't encrypt all server-to-server communications, opening the way for the NSA and others to access the data flow.
Obamacare Website Suffers Few Hack Attacks
News  |  11/15/2013  | 
Affordable Care Act site has faced a relatively low volume of attacks, compared with other federal websites.
Online Extortion: The Ethics Of Unpublishing
News  |  11/15/2013  | 
What are the ethical limits on the Internet, the land where anything goes? What happens when people invent new schemes for making money and then take them too far?
Secure Your Network From Modern Hazards
Commentary  |  11/15/2013  | 
Traditional security measures don't stand a chance in a data-centric world. But within the crisis lie opportunities for IT security pros.
LinkedIn Lesson: Detail Security First, Feature Fest Second
Commentary  |  11/15/2013  | 
Memo to businesses with an information security trust deficit: Prove how you're going to keep our data secure.
Higher Ed Must Lock Down Data Security
Commentary  |  11/15/2013  | 
Higher education rivals only the healthcare industry in housing personally identifiable data. Consider these tactics for smart planning.
IT Security Faces Big Data Skills and Resource Gap
News  |  11/15/2013  | 
In the near future, IT security teams will not be complete without at least one data scientist among its ranks.
Schneier: Time To Make NSA Eavesdropping Expensive
News  |  11/15/2013  | 
NSA surveillance piggybacks on corporate capabilities through cooperation, bribery, threats and compulsion, says security evangelist Bruce Schneier.
What The Carna Botnet Also Found
News  |  11/14/2013  | 
Researcher at Black Hat Brazil to present new data and analysis of the controversial Internet Census project
MacRumors Hacker Promises Stolen Passwords Are Safe
News  |  11/14/2013  | 
Hacker grabbed 860,000 passwords for fun, but promises not to leak or use them to harm people.
Research Into BIOS Attacks Underscores Their Danger
News  |  11/14/2013  | 
The jury is out on BadBIOS, but malware for motherboards and other hardware is both possible and, with the rise of the Internet of Things, likely
Study: Many Consumers Still Untrained On Privacy Risks
Quick Hits  |  11/14/2013  | 
Most consumers have not had security training, fail to stay up to date on privacy policies, Harris survey finds
DDoS Attack: Preparing For The Inevitable
Commentary  |  11/14/2013  | 
DDoS mitigation is a challenging undertaking. Here are four steps to help you plan for the worst.
Facebook Forces Some Users To Reset Passwords
News  |  11/13/2013  | 
Facebook is asking users whose passwords may have been exposed on others sites to change passwords to access the social website.
The Emergence of DDoS-as-a-Service
Commentary  |  11/13/2013  | 
"Legitimized" services increase DDoS threats and lend credence to the notion that information security is as much about corporate health as it is self-defense.
Report: Social Media Gets Abused
Quick Hits  |  11/12/2013  | 
New data culled from real-world branded social media accounts shows cybercriminals' obsession with going social
Tech Insight: Viral Arms Race Brings New, Better Evasion
News  |  11/11/2013  | 
New malware advances focus on evading security researchers and automated analysis sandboxes
Data Center Servers Exposed
News  |  11/11/2013  | 
Popular server firmware contains multiple zero-day vulnerabilities, but fixes are fraught with trade-offs
Criminals Exploit Microsoft Office Zero-Day Flaw
News  |  11/8/2013  | 
At least two sets of attackers have been using malicious Office documents to exploit the graphics processing vulnerability.
Hackers Threaten Destruction Of Obamacare Website
News  |  11/8/2013  | 
DDoS tool targets the federal Affordable Care Act website. But will it work?
New Bucks For Bugs Program Focuses On Open-Source Software, Internet Infrastructure
News  |  11/7/2013  | 
Microsoft and Facebook co-sponsor community bug bounty program that pays researchers for flaws found in popular open-source software, Internet protocols
ColdFusion Hacks Point To Unpatched Systems
News  |  11/7/2013  | 
Several highly publicized hacks have been traced to unpatched ColdFusion vulnerabilities, collectively leading to one million records being stolen.
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-01
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
PUBLISHED: 2022-07-01
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
PUBLISHED: 2022-07-01
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.