Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in December 2008
200 Sony PS3s Harnessed To Crack Secure Site Certification
News  |  12/31/2008  | 
A research group finds a way to forge certain digital certificates and create fake versions of popular e-commerce and banking sites.
'Curse Of Silence' Exploit Found For Nokia Handsets
News  |  12/31/2008  | 
A single malformed SMS message can prevent some handsets from sending and receiving further SMS and MMS messages, security researchers warn.
Four Threats For '09 That You've Probably Never Heard Of (Or Thought About)
News  |  12/31/2008  | 
What could keep you up at night in the new year may not be what you expect -- a look at some of the lesser-known threats predicted for 2009
Top 10 Security Stories Of 2008
News  |  12/30/2008  | 
A spike in data breaches, the threat of malicious hardware, and alarming revelations about the Internet's vulnerabilities from security experts such as Dan Kaminsky all made headlines in 2008.
Verizon Wins $33 Million In Cybersquatting Case
News  |  12/30/2008  | 
The telecom said this is the largest-ever cybersquatting judgment, but it may have a hard time getting the money from OnlineNIC.
Microsoft: The Windows Media Player Flaw That Wasn't
Quick Hits  |  12/30/2008  | 
Microsoft refutes report of code execution vulnerability
Zero-Day SQL Server Flaw Could Allow Remote Code Execution
News  |  12/23/2008  | 
Exploits of unpatched vulnerability have already been published, Microsoft warns
Researchers Point Out XSS Flaws On American Express Site
News  |  12/22/2008  | 
Flaws could jeopardize users' identities, researchers say
Microsoft Releases Critical Internet Explorer Patch
News  |  12/17/2008  | 
The out-of-band security update fixes a JavaScript-related vulnerability that's being actively exploited through hacked Web sites.
The Five Coolest Hacks Of 2008
News  |  12/17/2008  | 
Not even your psyche was safe from hacking this year -- hackers found holes in the highway toll system, building security -- and, yes, your head
Microsoft Issuing Emergency Patch For Internet Explorer
News  |  12/16/2008  | 
Without the fix, hackers have the potential to access a computer's memory space, causing IE to exit unexpectedly, in a state that can be exploited.
Zero-Day Exploits On IE7 Could Spread To Other Microsoft Browsers
News  |  12/16/2008  | 
IE5, IE6, and the IE8 beta are also potentially vulnerable, software giant says
Google No Longer Among Top 20 Most Trusted Companies For Privacy
News  |  12/15/2008  | 
A consumer-opinion survey found that Apple, Facebook, Yahoo, and other companies outranked Google in trustworthiness and protection of personal information.
Cisco: Cybercriminals Hiding Behind Legitimate Websites, Email Accounts
News  |  12/15/2008  | 
New annual security threat report from Cisco highlights a 'rough year' for computing in 2008
AT&T, T-Mobile Fined For Voice-Mail Security
News  |  12/12/2008  | 
After a string of high-profile hacks, the Los Angeles district attorney has filed an injunction against the carriers for overstating the security of their voice-mail systems.
Study: One-Quarter Of Antivirus Apps Aren't Working
Quick Hits  |  12/12/2008  | 
Promisec study says many AV packages are disabled or weren't installed properly in the first place
Poor Computer Security Putting Immigrant Data At Risk
News  |  12/12/2008  | 
Vulnerabilities are common where money transfers, check cashing, bill payment, travel services, auto insurance, or notary services are provided, a research firm found.
Zero-Day Microsoft Vulnerabilities Being Exploited
News  |  12/11/2008  | 
Web sites have been found with malicious JavaScript code that attempts to exploit a vulnerability in Internet Explorer 7.
Zero-Day Bug Discovered In IE7
Quick Hits  |  12/11/2008  | 
Vulnerability in the wild could allow attackers to control and steal data from remote PCs
Firefox Leads List Of Most Vulnerable Apps
News  |  12/11/2008  | 
Bit9's list of the 12 riskiest apps to enterprises also includes Acrobat, iTunes, and Skype.
Americans Comfortable With Biometrics, Effective Or Not
News  |  12/9/2008  | 
Older and wealthier U.S.-based respondents indicated a preference for fingerprint scans as a method of verification, according to a survey of 12,000 people worldwide.
Microsoft Patch Day Brings Eight Security Bulletins
News  |  12/9/2008  | 
The bulletins address 28 vulnerabilities in Windows Search, Internet Explorer, Microsoft Office, and other Microsoft software.
U.S. Losing Cyberspace Security Battle
News  |  12/8/2008  | 
The incoming Obama administration has more than two dozen recommendations to about how to more effectively defend cyberspace, as part of a CSIS commission report.
Magazine Reporters Arrange To Buy 21 Million Identities
Quick Hits  |  12/8/2008  | 
In investigative article, journalists seek to prove how easy it is to buy large amounts of personal data
Report: IT, Security Departments Not Seeing Eye To Eye On Threats To The Business
News  |  12/7/2008  | 
While 92 percent of security professionals in new Ponemon-Lumension study say their organization suffered a cyberattack, only 55 percent of IT staffers said the same
Facebook Worm Comes From Infected Friends
News  |  12/5/2008  | 
The Koobface worm has surfaced in a new form and is again menacing Facebook users with spammed links to malicious Web sites.
Black Friday Kicks Off Red-Letter Week For Phishers
Quick Hits  |  12/3/2008  | 
Number of threats increased by 300 percent over 2007, report says
Microsoft, EMC's RSA Partner To Protect Data
News  |  12/3/2008  | 
The near-term arrangement will connect RSA's DLP Suite 6.5 with Microsoft Active Directory Rights Management Services in Windows Server 2008.
Popular Home DSL Routers At Risk Of CSRF Attack
News  |  12/3/2008  | 
Researcher demonstrates ease of hacking home routers with insidious cross-site request forgery (CSRF) attack
Study: Korea Is Most Popular Origin Of Intrusions
Quick Hits  |  12/1/2008  | 
U.S., China still top virus, spam charts


Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.