Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in December 2008
200 Sony PS3s Harnessed To Crack Secure Site Certification
News  |  12/31/2008  | 
A research group finds a way to forge certain digital certificates and create fake versions of popular e-commerce and banking sites.
'Curse Of Silence' Exploit Found For Nokia Handsets
News  |  12/31/2008  | 
A single malformed SMS message can prevent some handsets from sending and receiving further SMS and MMS messages, security researchers warn.
Four Threats For '09 That You've Probably Never Heard Of (Or Thought About)
News  |  12/31/2008  | 
What could keep you up at night in the new year may not be what you expect -- a look at some of the lesser-known threats predicted for 2009
Top 10 Security Stories Of 2008
News  |  12/30/2008  | 
A spike in data breaches, the threat of malicious hardware, and alarming revelations about the Internet's vulnerabilities from security experts such as Dan Kaminsky all made headlines in 2008.
Verizon Wins $33 Million In Cybersquatting Case
News  |  12/30/2008  | 
The telecom said this is the largest-ever cybersquatting judgment, but it may have a hard time getting the money from OnlineNIC.
Microsoft: The Windows Media Player Flaw That Wasn't
Quick Hits  |  12/30/2008  | 
Microsoft refutes report of code execution vulnerability
Zero-Day SQL Server Flaw Could Allow Remote Code Execution
News  |  12/23/2008  | 
Exploits of unpatched vulnerability have already been published, Microsoft warns
Researchers Point Out XSS Flaws On American Express Site
News  |  12/22/2008  | 
Flaws could jeopardize users' identities, researchers say
Microsoft Releases Critical Internet Explorer Patch
News  |  12/17/2008  | 
The out-of-band security update fixes a JavaScript-related vulnerability that's being actively exploited through hacked Web sites.
The Five Coolest Hacks Of 2008
News  |  12/17/2008  | 
Not even your psyche was safe from hacking this year -- hackers found holes in the highway toll system, building security -- and, yes, your head
Microsoft Issuing Emergency Patch For Internet Explorer
News  |  12/16/2008  | 
Without the fix, hackers have the potential to access a computer's memory space, causing IE to exit unexpectedly, in a state that can be exploited.
Zero-Day Exploits On IE7 Could Spread To Other Microsoft Browsers
News  |  12/16/2008  | 
IE5, IE6, and the IE8 beta are also potentially vulnerable, software giant says
Google No Longer Among Top 20 Most Trusted Companies For Privacy
News  |  12/15/2008  | 
A consumer-opinion survey found that Apple, Facebook, Yahoo, and other companies outranked Google in trustworthiness and protection of personal information.
Cisco: Cybercriminals Hiding Behind Legitimate Websites, Email Accounts
News  |  12/15/2008  | 
New annual security threat report from Cisco highlights a 'rough year' for computing in 2008
AT&T, T-Mobile Fined For Voice-Mail Security
News  |  12/12/2008  | 
After a string of high-profile hacks, the Los Angeles district attorney has filed an injunction against the carriers for overstating the security of their voice-mail systems.
Study: One-Quarter Of Antivirus Apps Aren't Working
Quick Hits  |  12/12/2008  | 
Promisec study says many AV packages are disabled or weren't installed properly in the first place
Poor Computer Security Putting Immigrant Data At Risk
News  |  12/12/2008  | 
Vulnerabilities are common where money transfers, check cashing, bill payment, travel services, auto insurance, or notary services are provided, a research firm found.
Zero-Day Microsoft Vulnerabilities Being Exploited
News  |  12/11/2008  | 
Web sites have been found with malicious JavaScript code that attempts to exploit a vulnerability in Internet Explorer 7.
Zero-Day Bug Discovered In IE7
Quick Hits  |  12/11/2008  | 
Vulnerability in the wild could allow attackers to control and steal data from remote PCs
Firefox Leads List Of Most Vulnerable Apps
News  |  12/11/2008  | 
Bit9's list of the 12 riskiest apps to enterprises also includes Acrobat, iTunes, and Skype.
Americans Comfortable With Biometrics, Effective Or Not
News  |  12/9/2008  | 
Older and wealthier U.S.-based respondents indicated a preference for fingerprint scans as a method of verification, according to a survey of 12,000 people worldwide.
Microsoft Patch Day Brings Eight Security Bulletins
News  |  12/9/2008  | 
The bulletins address 28 vulnerabilities in Windows Search, Internet Explorer, Microsoft Office, and other Microsoft software.
U.S. Losing Cyberspace Security Battle
News  |  12/8/2008  | 
The incoming Obama administration has more than two dozen recommendations to about how to more effectively defend cyberspace, as part of a CSIS commission report.
Magazine Reporters Arrange To Buy 21 Million Identities
Quick Hits  |  12/8/2008  | 
In investigative article, journalists seek to prove how easy it is to buy large amounts of personal data
Report: IT, Security Departments Not Seeing Eye To Eye On Threats To The Business
News  |  12/7/2008  | 
While 92 percent of security professionals in new Ponemon-Lumension study say their organization suffered a cyberattack, only 55 percent of IT staffers said the same
Facebook Worm Comes From Infected Friends
News  |  12/5/2008  | 
The Koobface worm has surfaced in a new form and is again menacing Facebook users with spammed links to malicious Web sites.
Black Friday Kicks Off Red-Letter Week For Phishers
Quick Hits  |  12/3/2008  | 
Number of threats increased by 300 percent over 2007, report says
Microsoft, EMC's RSA Partner To Protect Data
News  |  12/3/2008  | 
The near-term arrangement will connect RSA's DLP Suite 6.5 with Microsoft Active Directory Rights Management Services in Windows Server 2008.
Popular Home DSL Routers At Risk Of CSRF Attack
News  |  12/3/2008  | 
Researcher demonstrates ease of hacking home routers with insidious cross-site request forgery (CSRF) attack
Study: Korea Is Most Popular Origin Of Intrusions
Quick Hits  |  12/1/2008  | 
U.S., China still top virus, spam charts


AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4147
PUBLISHED: 2019-09-16
IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 158413.
CVE-2019-5481
PUBLISHED: 2019-09-16
Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
CVE-2019-5482
PUBLISHED: 2019-09-16
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
CVE-2019-15741
PUBLISHED: 2019-09-16
An issue was discovered in GitLab Omnibus 7.4 through 12.2.1. An unsafe interaction with logrotate could result in a privilege escalation
CVE-2019-16370
PUBLISHED: 2019-09-16
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.