Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in December 2012
7 Top Information Security Trends For 2013
News  |  12/27/2012  | 
From sandboxing enterprise apps on mobile devices to hacking websites via high-bandwidth cloud attacks, experts detail the security trends they expect to see in 2013.
Tech Insight: Using Penetration Tests To Gauge Real Risk
News  |  12/21/2012  | 
A quality pen test can ferret out the real risk that vulnerabilities pose to a company and its data
10 Biggest Information Security Stories Of 2012
News  |  12/21/2012  | 
From John McAfee's escape from Belize to the privacy debacle that compromised CIA director Petraeus' career, 2012 had no shortage of security shockers.
Automated Malware Analysis Under Attack
News  |  12/20/2012  | 
Malware writers go low-tech in their latest attempt to escape detection, waiting for human input -- a mouse click -- before running their code
Windows 8 Security Stresses Exploit Prevention
News  |  12/20/2012  | 
A look at some of the key security features in the Microsoft's new OS
Anonymous Continues Westboro Church Attacks
News  |  12/20/2012  | 
Hacktivist collective Anonymous gets help with attacks against Westboro Baptist Church, which pledged to picket funerals of shooting victims in Newtown, Conn.
BestBuy.Com Chief Leaves For Symantec
News  |  12/20/2012  | 
Former Starbucks CIO and 2011 InformationWeek Chief of The Year Stephen Gillett heads to Silicon Valley.
9 Ways Hacktivists Shocked The World In 2012
News  |  12/20/2012  | 
Despite the arrests of alleged LulzSec and Anonymous ringleaders, ongoing attacks -- including Muslim hackers disrupting U.S. banks -- prove hacktivism remains alive and well.
Attack Turns Android Devices Into Spam-Spewing Botnets
News  |  12/19/2012  | 
Beware Trojan app sending 500,000 spam SMS messages per day, charging messages to smartphone owners.
Anonymous Posts Westboro Church Members' Personal Information
News  |  12/18/2012  | 
Anonymous and other hackers have launched DDoS attacks and leaked personal information about group that promised to protest funerals of victims killed at Sandy Hook Elementary School.
Five Significant Insider Attacks Of 2012
News  |  12/17/2012  | 
From the recent theft of counterterrorism data from Switzerland's intelligence agency to remotely wiretapping boardroom videoconferencing systems, a number of attacks had an inside component
Britain Declines To Prosecute Alleged NASA Hacker
News  |  12/17/2012  | 
After 10-year legal battle for allegedly hacking U.S. government computers in search of information on UFOs, British hacker Gary McKinnon is free.
U.S. Creates System To Look For 'Future Crimes'
News  |  12/14/2012  | 
In March, the United States granted counterterrorism officials the ability to hold data on Americans for up to five years. Now, the controversy surrounding the data-analysis program has come to light
Survey: Threat Intelligence Reports Play Key Role In Security Strategies
Quick Hits  |  12/13/2012  | 
Turns out enterprises really do read and take heed of security threat intelligence reports
S.C. Security Blunders Show Why States Get Hacked
Commentary  |  12/13/2012  | 
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
McAfee Back In U.S.: Crazy Like A Fox?
News  |  12/13/2012  | 
Guatemala refuses asylum request and deports AV founder McAfee to Miami. Officials in Belize dismiss McAfee's claims that he's being persecuted by government, call him "bonkers."
Long Shadow Of Stuxnet Inspires Custom Anti-Malware Project
News  |  12/13/2012  | 
Global maritime SCADA player forced to take the malware problem into its own hands for its offshore drilling, subsea, and merchant marine customers
Could A Thumb Drive Stop Stuxnet?
News  |  12/12/2012  | 
Kingston launches USB thumb drives with built-in ESET antivirus software to eliminate viruses, Trojan applications, rootkits, and worms.
McAfee To Be Released From Guatemalan Prison
News  |  12/12/2012  | 
Antivirus founder's lawyer said a Guatemalan judge will rule that McAfee was illegally detained, paving the way for his return to the United States.
Slide Show: 10 Security-Service Startups To Remember In 2012
Slideshows  |  12/11/2012  | 
With the security services market growing by more than 23 percent per year, it's no wonder that 2012 had its share of startup launches and young companies taking off
McAfee Founder Sells Rights To Life Story
News  |  12/11/2012  | 
Antivirus company founder remains in Guatemalan jail awaiting deportation to Belize for questioning in a murder investigation.
Team Ghostshell Hackers Claim NASA, Interpol, Pentagon Breaches
News  |  12/10/2012  | 
Group boasts "juicy release" of 1.6 million records and accounts drawn from defense contractors, government agencies, trade organizations and more.
Anonymous No Longer: Hacktivist Spokesman Charged
News  |  12/10/2012  | 
Texas charges a self-professed Anonymous spokesman with handling stolen Stratfor credit card data; Britain convicts four people for Operation Payback DDoS attacks.
6 Wacky McAfee Facts: From Guatemala, With Twists
News  |  12/7/2012  | 
You can't make up stories like the one unfolding around rogue antivirus company founder John McAfee. Catch up on the latest.
Slide Show: Top 10 Malware Advances In 2012
Slideshows  |  12/6/2012  | 
Blackhole's business model, Flashback's Mac fetish, ransomware's resurgence with Reveton, and Gauss' ability to guard against analysis among the game-changers this year
Royal Security Fail: 'May I Speak To Kate?'
Commentary  |  12/6/2012  | 
The oldest -- and most effective -- social engineering trick in the book remains getting on the phone and impersonating an insider. Ask Kate Middleton, the Duchess of Cambridge.
Swiss Spooks Warn Of Counter-Terrorism Intelligence Breach
News  |  12/6/2012  | 
Swiss government suspects insider may have stolen counter-terrorism information that had been shared with Switzerland by foreign governments, including Britain and the United States.
Attack Intelligence-Sharing Goes 'Wire-Speed'
News  |  12/5/2012  | 
STIX standard aimed at eliminating manual process of converting intelligence into useful defense
Zeus Botnet Eurograbber Steals $47 Million
News  |  12/5/2012  | 
Sophisticated, targeted attack campaign enabled criminals to steal an estimated $47 million from more than 30,000 corporate and private banking customers.
Twitter Users Vulnerable To SMS Spoofing Attack
News  |  12/4/2012  | 
Twitter vulnerability would allow attackers to post messages to targeted accounts. Similar flaw has already been addressed by Facebook and SMS payment provider Venmo.
Catching Attacks From The Inside Means Crunching More Data
News  |  12/3/2012  | 
Mining access logs and identity stores can provide a good picture of what's going on inside the firewall, including suspicious insider activity
Ransomware Pays: FBI Updates Reveton Malware Warning
News  |  12/3/2012  | 
Latest malware, trying to trick users into paying a fine, claims the FBI is using audio, video, and other devices to record computer's "illegal" activity.
DARPA Looks For Backdoors, Malware In Tech Products
News  |  12/3/2012  | 
In the wake of concerns about Huawei and ZTE equipment security, defense research agency seeks help identifying backdoors and malicious capabilities in software and firmware.
Finding Vulnerabilities By Attacking Your Own Environment
Quick Hits  |  12/2/2012  | 
Penetration testing can be essential in exposing your organization's security weaknesses -- and you don't always need to hire an outside firm to do it


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19071
PUBLISHED: 2019-11-18
A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
CVE-2019-19072
PUBLISHED: 2019-11-18
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
CVE-2019-19073
PUBLISHED: 2019-11-18
Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, ...
CVE-2019-19074
PUBLISHED: 2019-11-18
A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
CVE-2019-19075
PUBLISHED: 2019-11-18
A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.