Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2008
<<   <   Page 2 / 2
MIT Presentation on Subway Hack Leaks Out
News  |  8/12/2008  | 
In ironic twist, court documents that argue for suppression of Defcon presentation help distribute data about the hack
LinkedIn Hack Demonstrates Ease of Impersonation
Quick Hits  |  8/12/2008  | 
Researchers channel Marcus Ranum on popular social network, duping security icon's friends, family, and colleagues
Georgian Government, News Sites Under Cyber Attack
News  |  8/12/2008  | 
Attacks attributed to Russia take many key information sources offline
MIT Students Ordered To Withhold Boston's MTA Hack Details
News  |  8/11/2008  | 
The MIT students had intended to discuss the techniques they used to change the value on a MBTA CharlieTicket from $2 to $653.
Some AV Tools Detect Less Than Half of Active Malware Attacks
Quick Hits  |  8/11/2008  | 
In test, some popular antivirus packages miss almost two thirds of malware thrown at them
Researchers: There's Gold in Them Thar Hacks
News  |  8/8/2008  | 
Black Hat presentation shows some simple methods hackers have used to get rich or die trying
Fuzzing Nips Static Analysis in 'Iron Chef' Contest
Quick Hits  |  8/8/2008  | 
Both teams find exploits in under an hour at Black Hat contest
New Microsoft Program Helps Fix Third-Party Vulnerabilities
News  |  8/8/2008  | 
Microsoft to officially share with Windows third-party app vendors flaws it finds in their software
Black Hat: Windows Jingle Attack Exposed
News  |  8/7/2008  | 
The latest scheme steals data by encoding a user's password into audio data and concealing that data in the Windows startup tone for decoding later, researchers reveal.
'Bringing Sexy Back' to Hacking
News  |  8/7/2008  | 
DefCon session will feature iPhones running WiFi scans and sophisticated spear-phishing tricks
CNN, Olympics Spam Put Botnet in First Place
Quick Hits  |  8/7/2008  | 
Rustock botnet edges Srizbi as number one spamming botnet, according to Marshal's TRACE team
Black Hat: Security Offers Illusion Of Control
News  |  8/6/2008  | 
Security evangelist Ian Angell offers up his take on network security and suggests that "only neurotics think they can use technology to control the real world."
Dan Kaminsky Reveals DNS Flaw At Black Hat
News  |  8/6/2008  | 
More than 80 technology vendors launched an unprecedented campaign to fix a flaw in widely distributed DNS software that could allow a form of attack called DNS cache poisoning.
Kaminsky: DNS Vulnerability Will Affect Email, Internal Systems, Too
News  |  8/6/2008  | 
If you think the now-infamous flaw is limited to browsers and the Web, think again, pioneer researcher says
Black Hat Keynoter: Computer Security Is Impossible
Quick Hits  |  8/6/2008  | 
Contrarian professor says companies put too much stock in computer systems - and security
Malicious Botnet Stole Bank, Credit Union Credentials
News  |  8/6/2008  | 
New report says the 50 GB of data stolen were only one fourth of the data harvested
DOJ Charges 11 In Retail Hacking, ID Theft Scheme
News  |  8/5/2008  | 
Some 40 million credit and debit card numbers reportedly were stolen from TJX, BJ's Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, and others.
Feds Arrest Hackers of TJX, Other Retailers in Huge Conspiracy Bust
News  |  8/5/2008  | 
Eleven perpetrators held responsible for online theft and sale of more than 40 million credit and debit cards
Microsoft Revamps Patch Tuesday Warning Process
News  |  8/5/2008  | 
Software giant will share vulnerability data early with third parties, create 'Exploitability Index' for newly found flaws
Apple Puts Kibosh on Two Sessions at Black Hat
Quick Hits  |  8/4/2008  | 
Revelations about vulnerabilities, security practices are disallowed by Apple's legal and PR departments
Online Threats Cost Consumers $8.5 Billion Over Last Two Years
News  |  8/1/2008  | 
Consumer Reports cites security problems as a main motivation for buying a new PC or Mac and also lists what it considers to be the seven most common online blunders.
Freezing the Cold-Boot Attack
News  |  8/1/2008  | 
Researcher reveals new technologies he built to combat attacks that crack disk encryption on machines
Bringing Science to the Debate
News  |  8/1/2008  | 
It's time to get an account of whether proof-of-concept/exploit code actually helps or hurts users
Survey: 90% of Security Incidents Went Unreported Last Year
Quick Hits  |  8/1/2008  | 
Storm only affected 14 percent of organizations last year, according to a newly released survey of RSA Conference attendees
<<   <   Page 2 / 2

COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-07
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.
PUBLISHED: 2020-07-07
&quot;HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame.&quot;
PUBLISHED: 2020-07-07
&quot;HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy.&quot;
PUBLISHED: 2020-07-07
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Linked.php dv parameter.
PUBLISHED: 2020-07-07
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Cameralyzer allows attackers to write files to the SD card. The Samsung ID is SVE-2020-16830 (July 2020).