Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in March 2008
Security Issues Limit Telecommuting
Quick Hits  |  3/31/2008  | 
Want to work from home? Better beef up security first, CDW study says
Black Hat Researcher Hacks Biometric System
News  |  3/31/2008  | 
'Biologger' steals fingerprint, other biometric data
Tech Insight: Keeping Your Thumb on Thumb Drives
News  |  3/28/2008  | 
Those little USB drives certainly are handy, but how do you keep your company's sensitive data from walking away? Here are a few ideas
Hacked in Two Minutes
Quick Hits  |  3/28/2008  | 
In contest, researcher cracks a Mac with lightning speed using zero-day exploit
CastleCops Hit by Another DDOS Attack
News  |  3/28/2008  | 
But this time, attackers employ a 'POST' attack
Free Honeypot Client Could Sting Malware
News  |  3/27/2008  | 
The Honeynet Project has released a new automated tool for thwarting botnet and other client-side attacks
Attention, Stolen Credit Card Shoppers
Quick Hits  |  3/27/2008  | 
Sophisticated online marketplace for stolen credit cards and data offers buyers volume discounts and guarantees
Phishers Enlist Google 'Dorks'
News  |  3/26/2008  | 
Researcher finds most phishing sites use Google search terms to locate vulnerable sites
Millions of Russians' Personal Data Posted on Free Website
News  |  3/26/2008  | 
Names, addresses, account information, and other data posted by unknown source
WhiteHat: 90% of Sites Still Vulnerable
News  |  3/25/2008  | 
Most sites open to hacks via cross-site scripting, CSRF, report says
Intel Researching New Approach to Laptop Security
News  |  3/24/2008  | 
'Proteus' technology tracks user behavior, flags atypical activity
Has Banking Industry Overlooked Its Biggest Breach Ever?
Quick Hits  |  3/24/2008  | 
Insider theft case at Compass Bank affected more than 1M customers
US Firms Brace for Cyber War
News  |  3/20/2008  | 
Last year's cyber attack on Estonia was the shape of things to come, warns expert
Vietnam: 95% of Its PCs Infected With Viruses
Quick Hits  |  3/20/2008  | 
Brokerages, other sensitive Websites also vulnerable to attack, Vietnamese officials report at security conference there
Lockdown Networks Shuts Down
News  |  3/19/2008  | 
NAC vendor cites slow adoption of technology, sagging economy, and lack of VC funding
Feds Get Guilty Plea From Operation Bot Roast
News  |  3/19/2008  | 
A 21-year-old bot herder faces 10 years and a $250,000 fine
Nigerian Scammers Put Victims on Their Calendars
Quick Hits  |  3/19/2008  | 
New Google Calendar exploit is harder for filtering systems to detect
Hannaford, Security Industry Hunt for Cause of Massive Breach
News  |  3/18/2008  | 
Speculation runs rampant as grocery retailer attempts to find out how 4.2 million credit card records were stolen
Mass Hack Hits 200,000 Web Pages
Quick Hits  |  3/18/2008  | 
New exploit differs significantly from last week's ASP-oriented attacks, McAfee says
FTC Deal Suggests Enterprises Could Be Liable for Poor Security
News  |  3/17/2008  | 
ValueClick found negligent when Commission discovers vulnerabilites contrary to privacy policies promising encryption and 'reasonable security measures'
Big Bucks Bug-Brokering Program Shuttered
News  |  3/17/2008  | 
'Cadillac' buyers were taking too long to close the deal
Curiosity Over Britney Kills Careers of 13 Cats
Quick Hits  |  3/17/2008  | 
UCLA Medical Center employees lose jobs after peeking at pop star's private files
Hacking Vista's Smart Cards
News  |  3/14/2008  | 
Former Microsoft security team member will demonstrate how his new fuzzer hacks smart card plug-in
Tech Insight: De-Fanging P2P
News  |  3/14/2008  | 
Peer-to-peer has gotten a bad rap, but there are ways to secure its legitimate use in your organization
Kurt Cobain: Ghost or ID Theft Victim?
Quick Hits  |  3/14/2008  | 
Legendary rock star is still buying houses long after his tragic death, according to widow Courtney Love
McAfee Warns of Mass Web Attack
News  |  3/13/2008  | 
At least 10,000 pages affected, researchers warn
Certegy Victims Offered Less Than a Buck
Quick Hits  |  3/13/2008  | 
Proposed settlement includes free credit monitoring services and $4M in reimbursements following massive data breach
Hacking WiFi
News  |  3/13/2008  | 
Here's an evil twin that can seriously alter your Starbucks experience
NSA Pushes 'Labeled' Access Control for NFS
News  |  3/13/2008  | 
National Security Agency's technology would tighten access to sensitive files and apps on NFS storage
When Bad Tech Leads to Worse Results
News  |  3/12/2008  | 
E-voting, 'friendly' worms may be flawed - and misunderstood
eEye to Add Retina Web App Scanner
Quick Hits  |  3/12/2008  | 
New software is rebranded version of NT Objectives's NTOSpider
Spam Takes a Vacation
News  |  3/11/2008  | 
South sea islands account for more spam per capita than anyplace else in the world
FTP Hacking on the Rise
News  |  3/11/2008  | 
First it was stolen FTP server admin privileges. Now it's spam messages with bot-infected FTP links
Australian Government Systems Under Attack
News  |  3/10/2008  | 
Officials not ready to say China is the source
Battle Against Fast-Flux Botnets Intensifies
News  |  3/10/2008  | 
ICANN proposes recommendations to help disrupt, and ultimately take down, these stealthy botnets
WhiteHat, F5 Offer 'Click & Fix' for Web App Vulnerabilities
Quick Hits  |  3/10/2008  | 
Integration deal automatically fixes cross-site scripting, SQL injection flaws on Websites
Cyber Preparedness Symposium Leaves Unanswered Questions
News  |  3/7/2008  | 
Effort to jump-start discussion between government, industry, and academia is clearly Version 1.0
Art Imitates Malware
Quick Hits  |  3/7/2008  | 
Or does malware imitate art? Award-winning artist uses malware code to create artistic renditions of Storm, Netsky, and other infamous threats
Surge of Phishing Kits Hits the Net
News  |  3/6/2008  | 
Researchers are investigating an unusually high volume of free phishing kits - over 400 - now in the wild
Encrypted PCs Still at Risk
Quick Hits  |  3/6/2008  | 
Scientists demonstrate ability to extract encryption keys that linger in PC memory
Hacking: The New Child's Play?
News  |  3/5/2008  | 
Researchers worry as teens and pre-teens play an increasing role in illegal online exploits
Tool Physically Hacks Windows
News  |  3/5/2008  | 
Lets an attacker use Firewire to take over a 'locked' Windows machine
What Are You Looking at?
Quick Hits  |  3/5/2008  | 
Prototype 'cyber-goggles' record everything they see - and index it for later analysis
Researchers Map Method for Spotting Suspicious Insiders
News  |  3/4/2008  | 
Mining of email data could help companies spot dangerous employees before they do damage
New Method IDs Phishing, Malicious Domains
News  |  3/4/2008  | 
Researchers at a secretive security summit hosted by Yahoo revealed new ways they are finding phishers and other bad sites
Survey: Enterprises Don't Know Sensitive Data Flow
Quick Hits  |  3/4/2008  | 
Upcoming report from The 451 Group demonstrates how little progress enterprises have made in identifying and protecting sensitive data
SNMP Scan Nets Thousands of Vulnerable Devices
News  |  3/3/2008  | 
Researchers find products from Cisco, Apple, and Microsoft are vulnerable
Canadian Cops Bust Identity Theft 'Hub'
News  |  3/3/2008  | 
Nine arrested, suspected of being part of larger ID theft ring
Hackers Cut in Line to Buy Tickets
Quick Hits  |  3/3/2008  | 
Hack allows buyers to jump to the front of the queue and purchase prime tickets online before fans can get to them


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...