Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2011
<<   <   Page 2 / 2
Apple OS X Vulnerability: Advanced Persistent Attacks
News  |  8/4/2011  | 
Macs are even easier to exploit than Windows via advanced persistent threats, warn security researchers.
Pwnie Award Highlights: Sony Epic Fail And More
News  |  8/4/2011  | 
Stuxnet another winner at the annual Pwnie Awards, which honor the security world's achievements, failures, and musical talents.
Wardriving Evolves Into Warflying
News  |  8/4/2011  | 
Researchers release specs for a DIY radio-controlled plane that hacks systems by air
Banks Face Ongoing Cyber Threats
News  |  8/4/2011  | 
Although financial institutions have to date largely escaped the fate of the U.S. government and other industries, security experts warn that it's only a matter of time until a bank suffers a major breach from a cyber attack.
Stuxnet Changes Terrorism Equation, Says Former CIA Official
News  |  8/4/2011  | 
The attack marks a turning point for counterterrorism efforts, making cyber a potential threat to any nation's domestic security.
Anonymous Hacking Skills "Rudimentary" For Now
News  |  8/3/2011  | 
Drawing on the "higher levels of skill and creativity" of former LulzSec members may boost the efforts of the hactivist group, warms the Department of Homeland Security.
China Suspected Of Shady RAT Attacks
News  |  8/3/2011  | 
Security experts say it is clear that China is behind the multi-year attack that has compromised scores of companies and government agencies around the world.
Shady RAT Attack Hit 72 Organizations
News  |  8/3/2011  | 
McAfee said that the advanced, persistent threat began in 2006, and has targeted government agencies, Olympic Committees, and numerous businesses.
Cyber Threat Resembles Pre-9/11 Terror Threat: Black Hat
News  |  8/3/2011  | 
Government leaders don't understand the gravity of the threat of cyber attacks or the implications, ex-CIA official tells Black Hat attendees.
Shady Rat Attacks Hit 70 Organizations, 14 Countries
News  |  8/3/2011  | 
Operation Shady Rat, a massive cyber-espionage campaign, has been under way for five years against national governments, global companies, nonprofits, and others, says McAfee.
Kaminsky To Release Range Of Tools In 'Black Ops' Talk
News  |  8/3/2011  | 
Researcher Dan Kaminsky pokes holes in network security at Black Hat USA
Cybercrime Cleanup Costs Spike
News  |  8/2/2011  | 
Ponemon study finds median cost of responding to successful security breaches increased by 56% over the past year, thanks to more persistent and sophisticated attackers.
Tennessee BlueCross BlueShield Encrypts All Its Data
News  |  8/1/2011  | 
The insurer claims to be first anywhere to encrypt all "at-rest" data across the enterprise, a project that was put on the fast track after an embarrassing data breach.
Counterfeit Windows XP Breeding Malware
News  |  8/1/2011  | 
Security firm finds that 74% of all rootkit infections can be traced to Windows XP machines.
Alleged LulzSec Spokesman: New Details As Bail Set
News  |  8/1/2011  | 
Prosecutors accuse Jake Davis, aka "Topiary," of possessing 750,000 passwords and participating in multiple attacks.
Legacy Support Leaves Chip-And-PIN Vulnerable
News  |  8/1/2011  | 
Black Hat talk will show that security and backwards compatibility are at odds in popular authentication technology.
The Dark Side of Affiliate Marketing
News  |  8/1/2011  | 
Sketchy affiliate marketers increasingly act as the mediators between scam artists and spammers
<<   <   Page 2 / 2

Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...