Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in June 2012
Page 1 / 2   >   >>
Banking Trojan Harvests Newspaper Readers' Credentials
News  |  6/29/2012  | 
Financial malware performs brute-force guesses of valid usernames and passwords, possibly for attacks against consumer bank accounts.
GPS Spoofer Hacks Civilian Drone Navigation System
News  |  6/29/2012  | 
University of Texas researchers built a $1,000 system able to forcibly reroute or crash a civilian drone.
6 Ways Apple Is Polishing Mac Security
News  |  6/29/2012  | 
Apple no longer markets Macs as malware-free, but rather "built for security," and refines protection in Mountain Lion.
Black Hat: Developer Aims To Make Attack Recovery More Intelligent
News  |  6/28/2012  | 
One company uses threat information, virtualization and analysis to build a better way to disinfect compromised systems
4 Signs That Apple's Sharpening Its Security Game
News  |  6/28/2012  | 
Apple is quietly making some subtle, incremental security moves in the face of new threats to its products
FTC Sues Wyndham Hotels Over Data Security Failures
News  |  6/27/2012  | 
Hotel chain slammed for poor information security practices, leading to attackers obtaining 600,000 credit card numbers and committing millions of dollars in fraud.
RSA SecurID 800 Token Attack Detailed By Researchers
News  |  6/26/2012  | 
Cryptographic attack requires as little as 13 minutes to compromise a token's secret key, and works against at least eight types of cryptographic tokens. RSA dismissed the attack.
New Forensics Method May Nab Insider Thieves
News  |  6/26/2012  | 
Black Hat presentation features a new methodology that has already produced real-world results
LinkedIn Password Breach: 9 Facts Key To Lawsuit
News  |  6/26/2012  | 
LinkedIn's privacy policy promised users "industry standard protocols and technology," but a class action lawsuit claims LinkedIn failed to deliver. Take a closer look at the security issues.
Researchers Beat Up Google's Bouncer
News  |  6/25/2012  | 
The gatekeeper for the Android app store has major growing pains ahead, as security researchers find ways to bypass it
TSA Wants To Monitor Employee Computer Activities
News  |  6/25/2012  | 
Transportation Security Administration seeks software to monitor employee keystrokes, emails, attachments, screen captures, file transfers, chats, network activities, and website visits.
Avoid Net Shutdown Related To DNSChanger: SMB Tips
News  |  6/25/2012  | 
FBI will shut down servers associated with the DNSChanger malware on July 9, knocking 300,000-plus computers still affected offline. Here's what SMBs need to know.
Senators Float National Data Breach Law, Take Four
News  |  6/25/2012  | 
Data Security Bill is fourth attempt to craft a national law to supersede legislation now on the books in more than 40 states. But it's weaker than some state laws.
Flame: Reading Between The Ones And Zeros
Commentary  |  6/23/2012  | 
As more information about Flame is revealed, let's consider what we might infer from Flame's composition
Broader Digital Landscape Means More Places To Hide
News  |  6/22/2012  | 
With IPv6, a deluge of new top-level domains, and DNSSEC all coming, the Internet will become a much bigger place. Defenses that worked in the past won't work in the future
Twitter Crash: Hack Or Hardware Fail?
News  |  6/21/2012  | 
Twitter blames a cascading bug, but hacking group UGNazi claims responsibility.
6 Biggest Breaches Of 2012
News  |  6/21/2012  | 
Take stock and learn from the security mistakes of others.
Microsoft Names Finalists In Contest For New Security Defenses
Quick Hits  |  6/21/2012  | 
Three BlueHat Prize contestants invented ways to mitigate attacks exploiting memory-safety vulnerabilities
Hackers Offer Free Porn To Beat Security Checks
News  |  6/20/2012  | 
Spammers are enticing consumers with free porn or games in exchange for help cracking CAPTCHAs on targeted websites, security researchers say.
LinkedIn Security Breach Triggers $5 Million Lawsuit
News  |  6/20/2012  | 
Class action lawsuit alleges that social network failed to protect users' data and didn't use industry standard protocols and technology.
Advanced JavaScript Attack Threatens SOHO Routers
News  |  6/19/2012  | 
Using JavaScript and cross-site request forgery, two researchers plan to show it's possible to attack routers leveraging computers on the internal network
Former HP TippingPoint Researchers Start Vulnerability Buying Firm
Quick Hits  |  6/18/2012  | 
Exodus Intelligence will buy the rights to zero-day flaws and use them to build a vulnerability intelligence service
VMware Patches Virtualization Flaws
News  |  6/18/2012  | 
Bugs would allow attackers with administrator-level access to cause a denial of service or even take control of a targeted environment.
Security Startups Focusing On Threats, Not Malware
News  |  6/14/2012  | 
Stopping malware is so yesterday. Eclectic groups of security people have banded together to make life difficult for attackers
Google, Facebook, Twitter, AOL Fight Badware
News  |  6/14/2012  | 
Tech giants, Internet Advertising Bureau, and StopBadware form the Ads Integrity Alliance to battle malicious advertising.
Former Obama Cybersecurity Czar: More Walk, Less Talk Needed
News  |  6/14/2012  | 
Howard Schmidt says the U.S. government needs to start implementing its blueprints for secure identities and its international strategy for cybersecurity. Also warns about "cascading" effect of targeted malware.
Microsoft Fights Flame Malware With Certificate Killer
News  |  6/14/2012  | 
Flame malware spoofed a Microsoft digital certificate to automatically install itself on targeted PCs, leading Microsoft to tweak Windows to receive a daily update listing untrusted certificates.
LinkedIn Defends Security Practices, Leadership
News  |  6/13/2012  | 
Social network details info security lines of authority after being criticized for lacking a chief security officer.
New Virtualization Vulnerability Allows Escape To Hypervisor Attacks
News  |  6/13/2012  | 
Local privilege escalation vulnerability affects multiple virtualization products on Xen platform, would allow attacker to run arbitrary code or access any account, warns US-CERT.
Charleston Tests Predictive Analytics For Crime Prevention
News  |  6/13/2012  | 
Police department will use IBM software to detect robbery patterns and deploy officers to trouble spots.
Don't Blame Me, I'm Just An Employee
Commentary  |  6/12/2012  | 
If you're looking for a cure for mishandling of sensitive data, then look no further than your own management team
The Importance Of Interviews In Insider Investigations
News  |  6/12/2012  | 
Exit interviews speed up investigations, prove intent, and cover your legal bases
Feds Bust Credit Card Fraud Ring
News  |  6/12/2012  | 
A Dutch man, together with Maryland accomplice, is accused of running a site for buying and selling credit card data.
Attackers Turn Password Recovery Into Backdoor
News  |  6/12/2012  | 
Assault on CloudFlare shows that companies need to pay attention to how their security services are locked down, and how the credentials for those services can be recovered.
British Judge Forces Facebook To Identify Trolls
News  |  6/11/2012  | 
Harassment case billed as the first instance in Britain in which a private suit is used to unmask people who allegedly made offensive, anonymous taunts.
Flame Malware Code Traced To Stuxnet
News  |  6/11/2012  | 
Researchers find a link between the two different pieces of malware, suggesting that the U.S. government may be behind both.
MobileIron Distributes Enterprise Apps, Simplifies Android
News  |  6/8/2012  | 
With 3 new mobile app services, MobileIron hopes to help companies update their business processes for the phone and tablet era.
Keep Watch On Accounts For Stolen Passwords
News  |  6/8/2012  | 
Log management and a well-refined ruleset can help companies pinpoint suspicious activity on accounts that suggest a password compromise
7 Tips To Toughen Passwords
News  |  6/8/2012  | 
As this week's LinkedIn and eHarmony--and likely, Last.fm--breaches demonstrate, many website users continue to pick atrocious, easily cracked passwords. Are your passwords safe?
Research Find 'At Least 20' Ways To Bypass Google's Bouncer
News  |  6/8/2012  | 
Google's automated service for spotting malicious Android apps can be bypassed, they say
Microsoft Hardens Windows Update After Flame Attacks
News  |  6/7/2012  | 
Microsoft spells out effort to prevent attackers from abusing Windows Update again
Google Play Exploits Bypass Malware Checks
News  |  6/7/2012  | 
Security researchers find multiple ways to bypass Bouncer, Google's automated service for spotting malicious Android apps.
LinkedIn Confirms Password Breach, Phishing Intensifies
News  |  6/7/2012  | 
First your work life, now your love life? Hacker who stole at least 6.5 million LinkedIn passwords this week also uploaded 1.5 million password hashes from dating site eHarmony to a Russian hacking forum.
Was U.S. Government's Stuxnet Brag A Mistake?
Commentary  |  6/7/2012  | 
Some lawmakers accuse Obama administration of failing to manage its secrets, but Stuxnet now stands as a warning of America's cyber-warfare capabilities.
Siemens Enhances Security In Post-Stuxnet SCADA World
News  |  6/6/2012  | 
Firewall, VPN features now embedded in some products as Siemens gradually beefs up its security strategy
LinkedIn Users: Change Password Now
News  |  6/6/2012  | 
Attackers appear to have obtained--and may have already decrypted--at least 6.5 million LinkedIn passwords.
When Antivirus Fails, All Is Not Lost
News  |  6/6/2012  | 
Following Flame, Stuxnet, and Duqu, even the antivirus industry is questioning its ability to stop targeted attacks. Yet other technologies exist to catch malware in the corporate network.
Google To Warn Users About State-Sponsored Attacks
Quick Hits  |  6/5/2012  | 
Warning banner to display atop Google user accounts potentially being targeted
When Antivirus Fails, All Is Not Lost
News  |  6/5/2012  | 
Following Flame, Stuxnet, and Duqu, even the antivirus industry is questioning its ability to stop targeted attacks. Yet other technologies exist to catch malware in the corporate network
Google Issues Warnings For State-Sponsored Attacks
News  |  6/5/2012  | 
Google plans to let users know when government-sponsored hackers may be trying to hijack Google accounts.
Page 1 / 2   >   >>


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19071
PUBLISHED: 2019-11-18
A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
CVE-2019-19072
PUBLISHED: 2019-11-18
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
CVE-2019-19073
PUBLISHED: 2019-11-18
Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, ...
CVE-2019-19074
PUBLISHED: 2019-11-18
A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
CVE-2019-19075
PUBLISHED: 2019-11-18
A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.