Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2008
<<   <   Page 2 / 2
MIT Presentation on Subway Hack Leaks Out
News  |  8/12/2008  | 
In ironic twist, court documents that argue for suppression of Defcon presentation help distribute data about the hack
LinkedIn Hack Demonstrates Ease of Impersonation
Quick Hits  |  8/12/2008  | 
Researchers channel Marcus Ranum on popular social network, duping security icon's friends, family, and colleagues
Georgian Government, News Sites Under Cyber Attack
News  |  8/12/2008  | 
Attacks attributed to Russia take many key information sources offline
MIT Students Ordered To Withhold Boston's MTA Hack Details
News  |  8/11/2008  | 
The MIT students had intended to discuss the techniques they used to change the value on a MBTA CharlieTicket from $2 to $653.
Some AV Tools Detect Less Than Half of Active Malware Attacks
Quick Hits  |  8/11/2008  | 
In test, some popular antivirus packages miss almost two thirds of malware thrown at them
Researchers: There's Gold in Them Thar Hacks
News  |  8/8/2008  | 
Black Hat presentation shows some simple methods hackers have used to get rich or die trying
Fuzzing Nips Static Analysis in 'Iron Chef' Contest
Quick Hits  |  8/8/2008  | 
Both teams find exploits in under an hour at Black Hat contest
New Microsoft Program Helps Fix Third-Party Vulnerabilities
News  |  8/8/2008  | 
Microsoft to officially share with Windows third-party app vendors flaws it finds in their software
Black Hat: Windows Jingle Attack Exposed
News  |  8/7/2008  | 
The latest scheme steals data by encoding a user's password into audio data and concealing that data in the Windows startup tone for decoding later, researchers reveal.
'Bringing Sexy Back' to Hacking
News  |  8/7/2008  | 
DefCon session will feature iPhones running WiFi scans and sophisticated spear-phishing tricks
CNN, Olympics Spam Put Botnet in First Place
Quick Hits  |  8/7/2008  | 
Rustock botnet edges Srizbi as number one spamming botnet, according to Marshal's TRACE team
Black Hat: Security Offers Illusion Of Control
News  |  8/6/2008  | 
Security evangelist Ian Angell offers up his take on network security and suggests that "only neurotics think they can use technology to control the real world."
Dan Kaminsky Reveals DNS Flaw At Black Hat
News  |  8/6/2008  | 
More than 80 technology vendors launched an unprecedented campaign to fix a flaw in widely distributed DNS software that could allow a form of attack called DNS cache poisoning.
Kaminsky: DNS Vulnerability Will Affect Email, Internal Systems, Too
News  |  8/6/2008  | 
If you think the now-infamous flaw is limited to browsers and the Web, think again, pioneer researcher says
Black Hat Keynoter: Computer Security Is Impossible
Quick Hits  |  8/6/2008  | 
Contrarian professor says companies put too much stock in computer systems - and security
Malicious Botnet Stole Bank, Credit Union Credentials
News  |  8/6/2008  | 
New report says the 50 GB of data stolen were only one fourth of the data harvested
DOJ Charges 11 In Retail Hacking, ID Theft Scheme
News  |  8/5/2008  | 
Some 40 million credit and debit card numbers reportedly were stolen from TJX, BJ's Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, and others.
Feds Arrest Hackers of TJX, Other Retailers in Huge Conspiracy Bust
News  |  8/5/2008  | 
Eleven perpetrators held responsible for online theft and sale of more than 40 million credit and debit cards
Microsoft Revamps Patch Tuesday Warning Process
News  |  8/5/2008  | 
Software giant will share vulnerability data early with third parties, create 'Exploitability Index' for newly found flaws
Apple Puts Kibosh on Two Sessions at Black Hat
Quick Hits  |  8/4/2008  | 
Revelations about vulnerabilities, security practices are disallowed by Apple's legal and PR departments
Online Threats Cost Consumers $8.5 Billion Over Last Two Years
News  |  8/1/2008  | 
Consumer Reports cites security problems as a main motivation for buying a new PC or Mac and also lists what it considers to be the seven most common online blunders.
Freezing the Cold-Boot Attack
News  |  8/1/2008  | 
Researcher reveals new technologies he built to combat attacks that crack disk encryption on machines
Bringing Science to the Debate
News  |  8/1/2008  | 
It's time to get an account of whether proof-of-concept/exploit code actually helps or hurts users
Survey: 90% of Security Incidents Went Unreported Last Year
Quick Hits  |  8/1/2008  | 
Storm only affected 14 percent of organizations last year, according to a newly released survey of RSA Conference attendees
<<   <   Page 2 / 2

Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-13
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
PUBLISHED: 2019-12-13
samurai 0.7 has a heap-based buffer overflow in canonpath in util.c via a crafted build file.
PUBLISHED: 2019-12-13
Yabasic 2.86.2 has a heap-based buffer overflow in myformat in function.c via a crafted BASIC source file.
PUBLISHED: 2019-12-13
E5572-855 with versions earlier than has an improper authentication vulnerability. The device does not perform a sufficient authentication when doing certain operations, successful exploit could allow an attacker to cause the device to reboot after launch a man in the middle att...
PUBLISHED: 2019-12-13
Huawei smartphones HUAWEI Y9 2019 and Honor View 20 have a denial of service vulnerability. Due to insufficient input validation of specific value when parsing the messages, an attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices to exploit this vul...