Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in December 2008
200 Sony PS3s Harnessed To Crack Secure Site Certification
News  |  12/31/2008  | 
A research group finds a way to forge certain digital certificates and create fake versions of popular e-commerce and banking sites.
'Curse Of Silence' Exploit Found For Nokia Handsets
News  |  12/31/2008  | 
A single malformed SMS message can prevent some handsets from sending and receiving further SMS and MMS messages, security researchers warn.
Four Threats For '09 That You've Probably Never Heard Of (Or Thought About)
News  |  12/31/2008  | 
What could keep you up at night in the new year may not be what you expect -- a look at some of the lesser-known threats predicted for 2009
Top 10 Security Stories Of 2008
News  |  12/30/2008  | 
A spike in data breaches, the threat of malicious hardware, and alarming revelations about the Internet's vulnerabilities from security experts such as Dan Kaminsky all made headlines in 2008.
Verizon Wins $33 Million In Cybersquatting Case
News  |  12/30/2008  | 
The telecom said this is the largest-ever cybersquatting judgment, but it may have a hard time getting the money from OnlineNIC.
Microsoft: The Windows Media Player Flaw That Wasn't
Quick Hits  |  12/30/2008  | 
Microsoft refutes report of code execution vulnerability
Zero-Day SQL Server Flaw Could Allow Remote Code Execution
News  |  12/23/2008  | 
Exploits of unpatched vulnerability have already been published, Microsoft warns
Researchers Point Out XSS Flaws On American Express Site
News  |  12/22/2008  | 
Flaws could jeopardize users' identities, researchers say
Microsoft Releases Critical Internet Explorer Patch
News  |  12/17/2008  | 
The out-of-band security update fixes a JavaScript-related vulnerability that's being actively exploited through hacked Web sites.
The Five Coolest Hacks Of 2008
News  |  12/17/2008  | 
Not even your psyche was safe from hacking this year -- hackers found holes in the highway toll system, building security -- and, yes, your head
Microsoft Issuing Emergency Patch For Internet Explorer
News  |  12/16/2008  | 
Without the fix, hackers have the potential to access a computer's memory space, causing IE to exit unexpectedly, in a state that can be exploited.
Zero-Day Exploits On IE7 Could Spread To Other Microsoft Browsers
News  |  12/16/2008  | 
IE5, IE6, and the IE8 beta are also potentially vulnerable, software giant says
Google No Longer Among Top 20 Most Trusted Companies For Privacy
News  |  12/15/2008  | 
A consumer-opinion survey found that Apple, Facebook, Yahoo, and other companies outranked Google in trustworthiness and protection of personal information.
Cisco: Cybercriminals Hiding Behind Legitimate Websites, Email Accounts
News  |  12/15/2008  | 
New annual security threat report from Cisco highlights a 'rough year' for computing in 2008
AT&T, T-Mobile Fined For Voice-Mail Security
News  |  12/12/2008  | 
After a string of high-profile hacks, the Los Angeles district attorney has filed an injunction against the carriers for overstating the security of their voice-mail systems.
Study: One-Quarter Of Antivirus Apps Aren't Working
Quick Hits  |  12/12/2008  | 
Promisec study says many AV packages are disabled or weren't installed properly in the first place
Poor Computer Security Putting Immigrant Data At Risk
News  |  12/12/2008  | 
Vulnerabilities are common where money transfers, check cashing, bill payment, travel services, auto insurance, or notary services are provided, a research firm found.
Zero-Day Microsoft Vulnerabilities Being Exploited
News  |  12/11/2008  | 
Web sites have been found with malicious JavaScript code that attempts to exploit a vulnerability in Internet Explorer 7.
Zero-Day Bug Discovered In IE7
Quick Hits  |  12/11/2008  | 
Vulnerability in the wild could allow attackers to control and steal data from remote PCs
Firefox Leads List Of Most Vulnerable Apps
News  |  12/11/2008  | 
Bit9's list of the 12 riskiest apps to enterprises also includes Acrobat, iTunes, and Skype.
Americans Comfortable With Biometrics, Effective Or Not
News  |  12/9/2008  | 
Older and wealthier U.S.-based respondents indicated a preference for fingerprint scans as a method of verification, according to a survey of 12,000 people worldwide.
Microsoft Patch Day Brings Eight Security Bulletins
News  |  12/9/2008  | 
The bulletins address 28 vulnerabilities in Windows Search, Internet Explorer, Microsoft Office, and other Microsoft software.
U.S. Losing Cyberspace Security Battle
News  |  12/8/2008  | 
The incoming Obama administration has more than two dozen recommendations to about how to more effectively defend cyberspace, as part of a CSIS commission report.
Magazine Reporters Arrange To Buy 21 Million Identities
Quick Hits  |  12/8/2008  | 
In investigative article, journalists seek to prove how easy it is to buy large amounts of personal data
Report: IT, Security Departments Not Seeing Eye To Eye On Threats To The Business
News  |  12/7/2008  | 
While 92 percent of security professionals in new Ponemon-Lumension study say their organization suffered a cyberattack, only 55 percent of IT staffers said the same
Facebook Worm Comes From Infected Friends
News  |  12/5/2008  | 
The Koobface worm has surfaced in a new form and is again menacing Facebook users with spammed links to malicious Web sites.
Black Friday Kicks Off Red-Letter Week For Phishers
Quick Hits  |  12/3/2008  | 
Number of threats increased by 300 percent over 2007, report says
Microsoft, EMC's RSA Partner To Protect Data
News  |  12/3/2008  | 
The near-term arrangement will connect RSA's DLP Suite 6.5 with Microsoft Active Directory Rights Management Services in Windows Server 2008.
Popular Home DSL Routers At Risk Of CSRF Attack
News  |  12/3/2008  | 
Researcher demonstrates ease of hacking home routers with insidious cross-site request forgery (CSRF) attack
Study: Korea Is Most Popular Origin Of Intrusions
Quick Hits  |  12/1/2008  | 
U.S., China still top virus, spam charts


I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
6 Top Nontechnical Degrees for Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/21/2019
Anatomy of a BEC Scam
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15593
PUBLISHED: 2019-11-22
GitLab 12.2.3 contains a security vulnerability that allows a user to affect the availability of the service through a Denial of Service attack in Issue Comments.
CVE-2019-16285
PUBLISHED: 2019-11-22
If a local user has been configured and logged in, an unauthenticated attacker with physical access may be able to extract sensitive information onto a local drive.
CVE-2019-16286
PUBLISHED: 2019-11-22
An attacker may be able to bypass the OS application filter meant to restrict applications that can be executed by changing browser preferences to launch a separate process that in turn can execute arbitrary commands.
CVE-2019-16287
PUBLISHED: 2019-11-22
An attacker may be able to leverage the application filter bypass vulnerability to gain privileged access to create a file on the local file system whose presence puts the device in Administrative Mode, which will allow the attacker to executed commands with elevated privileges.
CVE-2019-18909
PUBLISHED: 2019-11-22
The VPN software within HP ThinPro does not safely handle user supplied input, which may be leveraged by an attacker to inject commands that will execute with root privileges.