Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2008
<<   <   Page 2 / 2
MIT Presentation on Subway Hack Leaks Out
News  |  8/12/2008  | 
In ironic twist, court documents that argue for suppression of Defcon presentation help distribute data about the hack
LinkedIn Hack Demonstrates Ease of Impersonation
Quick Hits  |  8/12/2008  | 
Researchers channel Marcus Ranum on popular social network, duping security icon's friends, family, and colleagues
Georgian Government, News Sites Under Cyber Attack
News  |  8/12/2008  | 
Attacks attributed to Russia take many key information sources offline
MIT Students Ordered To Withhold Boston's MTA Hack Details
News  |  8/11/2008  | 
The MIT students had intended to discuss the techniques they used to change the value on a MBTA CharlieTicket from $2 to $653.
Some AV Tools Detect Less Than Half of Active Malware Attacks
Quick Hits  |  8/11/2008  | 
In test, some popular antivirus packages miss almost two thirds of malware thrown at them
Researchers: There's Gold in Them Thar Hacks
News  |  8/8/2008  | 
Black Hat presentation shows some simple methods hackers have used to get rich or die trying
Fuzzing Nips Static Analysis in 'Iron Chef' Contest
Quick Hits  |  8/8/2008  | 
Both teams find exploits in under an hour at Black Hat contest
New Microsoft Program Helps Fix Third-Party Vulnerabilities
News  |  8/8/2008  | 
Microsoft to officially share with Windows third-party app vendors flaws it finds in their software
Black Hat: Windows Jingle Attack Exposed
News  |  8/7/2008  | 
The latest scheme steals data by encoding a user's password into audio data and concealing that data in the Windows startup tone for decoding later, researchers reveal.
'Bringing Sexy Back' to Hacking
News  |  8/7/2008  | 
DefCon session will feature iPhones running WiFi scans and sophisticated spear-phishing tricks
CNN, Olympics Spam Put Botnet in First Place
Quick Hits  |  8/7/2008  | 
Rustock botnet edges Srizbi as number one spamming botnet, according to Marshal's TRACE team
Black Hat: Security Offers Illusion Of Control
News  |  8/6/2008  | 
Security evangelist Ian Angell offers up his take on network security and suggests that "only neurotics think they can use technology to control the real world."
Dan Kaminsky Reveals DNS Flaw At Black Hat
News  |  8/6/2008  | 
More than 80 technology vendors launched an unprecedented campaign to fix a flaw in widely distributed DNS software that could allow a form of attack called DNS cache poisoning.
Kaminsky: DNS Vulnerability Will Affect Email, Internal Systems, Too
News  |  8/6/2008  | 
If you think the now-infamous flaw is limited to browsers and the Web, think again, pioneer researcher says
Black Hat Keynoter: Computer Security Is Impossible
Quick Hits  |  8/6/2008  | 
Contrarian professor says companies put too much stock in computer systems - and security
Malicious Botnet Stole Bank, Credit Union Credentials
News  |  8/6/2008  | 
New report says the 50 GB of data stolen were only one fourth of the data harvested
DOJ Charges 11 In Retail Hacking, ID Theft Scheme
News  |  8/5/2008  | 
Some 40 million credit and debit card numbers reportedly were stolen from TJX, BJ's Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, and others.
Feds Arrest Hackers of TJX, Other Retailers in Huge Conspiracy Bust
News  |  8/5/2008  | 
Eleven perpetrators held responsible for online theft and sale of more than 40 million credit and debit cards
Microsoft Revamps Patch Tuesday Warning Process
News  |  8/5/2008  | 
Software giant will share vulnerability data early with third parties, create 'Exploitability Index' for newly found flaws
Apple Puts Kibosh on Two Sessions at Black Hat
Quick Hits  |  8/4/2008  | 
Revelations about vulnerabilities, security practices are disallowed by Apple's legal and PR departments
Online Threats Cost Consumers $8.5 Billion Over Last Two Years
News  |  8/1/2008  | 
Consumer Reports cites security problems as a main motivation for buying a new PC or Mac and also lists what it considers to be the seven most common online blunders.
Freezing the Cold-Boot Attack
News  |  8/1/2008  | 
Researcher reveals new technologies he built to combat attacks that crack disk encryption on machines
Bringing Science to the Debate
News  |  8/1/2008  | 
It's time to get an account of whether proof-of-concept/exploit code actually helps or hurts users
Survey: 90% of Security Incidents Went Unreported Last Year
Quick Hits  |  8/1/2008  | 
Storm only affected 14 percent of organizations last year, according to a newly released survey of RSA Conference attendees
<<   <   Page 2 / 2

Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-22
The Artificial Intelligence theme before 1.2.4 for WordPress has XSS because Genericons HTML files are unnecessarily placed under the web root.
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\messages\messages_thread.php uses an unsanitized &quot;contact_uuid&quot; variable coming from the URL, which is reflected on 3 occasions in HTML, leading to XSS.
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\contacts\contact_addresses.php uses an unsanitized &quot;id&quot; variable coming from the URL, which is reflected in HTML, leading to XSS.
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\contacts\contact_edit.php uses an unsanitized &quot;query_string&quot; variable coming from the URL, which is reflected in HTML, leading to XSS.
PUBLISHED: 2019-10-22
The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring.