Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in March 2008
Security Issues Limit Telecommuting
Quick Hits  |  3/31/2008  | 
Want to work from home? Better beef up security first, CDW study says
Black Hat Researcher Hacks Biometric System
News  |  3/31/2008  | 
'Biologger' steals fingerprint, other biometric data
Tech Insight: Keeping Your Thumb on Thumb Drives
News  |  3/28/2008  | 
Those little USB drives certainly are handy, but how do you keep your company's sensitive data from walking away? Here are a few ideas
Hacked in Two Minutes
Quick Hits  |  3/28/2008  | 
In contest, researcher cracks a Mac with lightning speed using zero-day exploit
CastleCops Hit by Another DDOS Attack
News  |  3/28/2008  | 
But this time, attackers employ a 'POST' attack
Free Honeypot Client Could Sting Malware
News  |  3/27/2008  | 
The Honeynet Project has released a new automated tool for thwarting botnet and other client-side attacks
Attention, Stolen Credit Card Shoppers
Quick Hits  |  3/27/2008  | 
Sophisticated online marketplace for stolen credit cards and data offers buyers volume discounts and guarantees
Phishers Enlist Google 'Dorks'
News  |  3/26/2008  | 
Researcher finds most phishing sites use Google search terms to locate vulnerable sites
Millions of Russians' Personal Data Posted on Free Website
News  |  3/26/2008  | 
Names, addresses, account information, and other data posted by unknown source
WhiteHat: 90% of Sites Still Vulnerable
News  |  3/25/2008  | 
Most sites open to hacks via cross-site scripting, CSRF, report says
Intel Researching New Approach to Laptop Security
News  |  3/24/2008  | 
'Proteus' technology tracks user behavior, flags atypical activity
Has Banking Industry Overlooked Its Biggest Breach Ever?
Quick Hits  |  3/24/2008  | 
Insider theft case at Compass Bank affected more than 1M customers
US Firms Brace for Cyber War
News  |  3/20/2008  | 
Last year's cyber attack on Estonia was the shape of things to come, warns expert
Vietnam: 95% of Its PCs Infected With Viruses
Quick Hits  |  3/20/2008  | 
Brokerages, other sensitive Websites also vulnerable to attack, Vietnamese officials report at security conference there
Lockdown Networks Shuts Down
News  |  3/19/2008  | 
NAC vendor cites slow adoption of technology, sagging economy, and lack of VC funding
Feds Get Guilty Plea From Operation Bot Roast
News  |  3/19/2008  | 
A 21-year-old bot herder faces 10 years and a $250,000 fine
Nigerian Scammers Put Victims on Their Calendars
Quick Hits  |  3/19/2008  | 
New Google Calendar exploit is harder for filtering systems to detect
Hannaford, Security Industry Hunt for Cause of Massive Breach
News  |  3/18/2008  | 
Speculation runs rampant as grocery retailer attempts to find out how 4.2 million credit card records were stolen
Mass Hack Hits 200,000 Web Pages
Quick Hits  |  3/18/2008  | 
New exploit differs significantly from last week's ASP-oriented attacks, McAfee says
FTC Deal Suggests Enterprises Could Be Liable for Poor Security
News  |  3/17/2008  | 
ValueClick found negligent when Commission discovers vulnerabilites contrary to privacy policies promising encryption and 'reasonable security measures'
Big Bucks Bug-Brokering Program Shuttered
News  |  3/17/2008  | 
'Cadillac' buyers were taking too long to close the deal
Curiosity Over Britney Kills Careers of 13 Cats
Quick Hits  |  3/17/2008  | 
UCLA Medical Center employees lose jobs after peeking at pop star's private files
Hacking Vista's Smart Cards
News  |  3/14/2008  | 
Former Microsoft security team member will demonstrate how his new fuzzer hacks smart card plug-in
Tech Insight: De-Fanging P2P
News  |  3/14/2008  | 
Peer-to-peer has gotten a bad rap, but there are ways to secure its legitimate use in your organization
Kurt Cobain: Ghost or ID Theft Victim?
Quick Hits  |  3/14/2008  | 
Legendary rock star is still buying houses long after his tragic death, according to widow Courtney Love
McAfee Warns of Mass Web Attack
News  |  3/13/2008  | 
At least 10,000 pages affected, researchers warn
Certegy Victims Offered Less Than a Buck
Quick Hits  |  3/13/2008  | 
Proposed settlement includes free credit monitoring services and $4M in reimbursements following massive data breach
Hacking WiFi
News  |  3/13/2008  | 
Here's an evil twin that can seriously alter your Starbucks experience
NSA Pushes 'Labeled' Access Control for NFS
News  |  3/13/2008  | 
National Security Agency's technology would tighten access to sensitive files and apps on NFS storage
When Bad Tech Leads to Worse Results
News  |  3/12/2008  | 
E-voting, 'friendly' worms may be flawed - and misunderstood
eEye to Add Retina Web App Scanner
Quick Hits  |  3/12/2008  | 
New software is rebranded version of NT Objectives's NTOSpider
Spam Takes a Vacation
News  |  3/11/2008  | 
South sea islands account for more spam per capita than anyplace else in the world
FTP Hacking on the Rise
News  |  3/11/2008  | 
First it was stolen FTP server admin privileges. Now it's spam messages with bot-infected FTP links
Australian Government Systems Under Attack
News  |  3/10/2008  | 
Officials not ready to say China is the source
Battle Against Fast-Flux Botnets Intensifies
News  |  3/10/2008  | 
ICANN proposes recommendations to help disrupt, and ultimately take down, these stealthy botnets
WhiteHat, F5 Offer 'Click & Fix' for Web App Vulnerabilities
Quick Hits  |  3/10/2008  | 
Integration deal automatically fixes cross-site scripting, SQL injection flaws on Websites
Cyber Preparedness Symposium Leaves Unanswered Questions
News  |  3/7/2008  | 
Effort to jump-start discussion between government, industry, and academia is clearly Version 1.0
Art Imitates Malware
Quick Hits  |  3/7/2008  | 
Or does malware imitate art? Award-winning artist uses malware code to create artistic renditions of Storm, Netsky, and other infamous threats
Surge of Phishing Kits Hits the Net
News  |  3/6/2008  | 
Researchers are investigating an unusually high volume of free phishing kits - over 400 - now in the wild
Encrypted PCs Still at Risk
Quick Hits  |  3/6/2008  | 
Scientists demonstrate ability to extract encryption keys that linger in PC memory
Hacking: The New Child's Play?
News  |  3/5/2008  | 
Researchers worry as teens and pre-teens play an increasing role in illegal online exploits
Tool Physically Hacks Windows
News  |  3/5/2008  | 
Lets an attacker use Firewire to take over a 'locked' Windows machine
What Are You Looking at?
Quick Hits  |  3/5/2008  | 
Prototype 'cyber-goggles' record everything they see - and index it for later analysis
Researchers Map Method for Spotting Suspicious Insiders
News  |  3/4/2008  | 
Mining of email data could help companies spot dangerous employees before they do damage
New Method IDs Phishing, Malicious Domains
News  |  3/4/2008  | 
Researchers at a secretive security summit hosted by Yahoo revealed new ways they are finding phishers and other bad sites
Survey: Enterprises Don't Know Sensitive Data Flow
Quick Hits  |  3/4/2008  | 
Upcoming report from The 451 Group demonstrates how little progress enterprises have made in identifying and protecting sensitive data
SNMP Scan Nets Thousands of Vulnerable Devices
News  |  3/3/2008  | 
Researchers find products from Cisco, Apple, and Microsoft are vulnerable
Canadian Cops Bust Identity Theft 'Hub'
News  |  3/3/2008  | 
Nine arrested, suspected of being part of larger ID theft ring
Hackers Cut in Line to Buy Tickets
Quick Hits  |  3/3/2008  | 
Hack allows buyers to jump to the front of the queue and purchase prime tickets online before fans can get to them


I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
6 Top Nontechnical Degrees for Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/21/2019
Anatomy of a BEC Scam
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3654
PUBLISHED: 2019-11-22
Authentication Bypass vulnerability in the Microsoft Windows client in McAfee Client Proxy (MCP) prior to 3.0.0 allows local user to bypass scanning of web traffic and gain access to blocked sites for a short period of time via generating an authorization key on the client which should only be gener...
CVE-2014-2214
PUBLISHED: 2019-11-22
Multiple cross-site scripting (XSS) vulnerabilities in POSH (aka Posh portal or Portaneo) 3.0 through 3.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) error parameter to /includes/plugins/mobile/scripts/login.php or (2) id parameter to portal/openrssarticle.php
CVE-2014-6310
PUBLISHED: 2019-11-22
Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function.
CVE-2014-6311
PUBLISHED: 2019-11-22
generate_doygen.pl in ace before 6.2.7+dfsg-2 creates predictable file names in the /tmp directory which allows attackers to gain elevated privileges.
CVE-2019-16763
PUBLISHED: 2019-11-22
In Pannellum from 2.5.0 through 2.5.4 URLs were not sanitized for data URIs (or vbscript:), allowing for potential XSS attacks. Such an attack would require a user to click on a hot spot to execute and would require an attacker-provided configuration. The most plausible potential attack would be if ...