Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2011
<<   <   Page 2 / 2
Apple OS X Vulnerability: Advanced Persistent Attacks
News  |  8/4/2011  | 
Macs are even easier to exploit than Windows via advanced persistent threats, warn security researchers.
Pwnie Award Highlights: Sony Epic Fail And More
News  |  8/4/2011  | 
Stuxnet another winner at the annual Pwnie Awards, which honor the security world's achievements, failures, and musical talents.
Wardriving Evolves Into Warflying
News  |  8/4/2011  | 
Researchers release specs for a DIY radio-controlled plane that hacks systems by air
Banks Face Ongoing Cyber Threats
News  |  8/4/2011  | 
Although financial institutions have to date largely escaped the fate of the U.S. government and other industries, security experts warn that it's only a matter of time until a bank suffers a major breach from a cyber attack.
Stuxnet Changes Terrorism Equation, Says Former CIA Official
News  |  8/4/2011  | 
The attack marks a turning point for counterterrorism efforts, making cyber a potential threat to any nation's domestic security.
Anonymous Hacking Skills "Rudimentary" For Now
News  |  8/3/2011  | 
Drawing on the "higher levels of skill and creativity" of former LulzSec members may boost the efforts of the hactivist group, warms the Department of Homeland Security.
China Suspected Of Shady RAT Attacks
News  |  8/3/2011  | 
Security experts say it is clear that China is behind the multi-year attack that has compromised scores of companies and government agencies around the world.
Shady RAT Attack Hit 72 Organizations
News  |  8/3/2011  | 
McAfee said that the advanced, persistent threat began in 2006, and has targeted government agencies, Olympic Committees, and numerous businesses.
Cyber Threat Resembles Pre-9/11 Terror Threat: Black Hat
News  |  8/3/2011  | 
Government leaders don't understand the gravity of the threat of cyber attacks or the implications, ex-CIA official tells Black Hat attendees.
Shady Rat Attacks Hit 70 Organizations, 14 Countries
News  |  8/3/2011  | 
Operation Shady Rat, a massive cyber-espionage campaign, has been under way for five years against national governments, global companies, nonprofits, and others, says McAfee.
Kaminsky To Release Range Of Tools In 'Black Ops' Talk
News  |  8/3/2011  | 
Researcher Dan Kaminsky pokes holes in network security at Black Hat USA
Cybercrime Cleanup Costs Spike
News  |  8/2/2011  | 
Ponemon study finds median cost of responding to successful security breaches increased by 56% over the past year, thanks to more persistent and sophisticated attackers.
Tennessee BlueCross BlueShield Encrypts All Its Data
News  |  8/1/2011  | 
The insurer claims to be first anywhere to encrypt all "at-rest" data across the enterprise, a project that was put on the fast track after an embarrassing data breach.
Counterfeit Windows XP Breeding Malware
News  |  8/1/2011  | 
Security firm finds that 74% of all rootkit infections can be traced to Windows XP machines.
Alleged LulzSec Spokesman: New Details As Bail Set
News  |  8/1/2011  | 
Prosecutors accuse Jake Davis, aka "Topiary," of possessing 750,000 passwords and participating in multiple attacks.
Legacy Support Leaves Chip-And-PIN Vulnerable
News  |  8/1/2011  | 
Black Hat talk will show that security and backwards compatibility are at odds in popular authentication technology.
The Dark Side of Affiliate Marketing
News  |  8/1/2011  | 
Sketchy affiliate marketers increasingly act as the mediators between scam artists and spammers
<<   <   Page 2 / 2

COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-07
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.
PUBLISHED: 2020-07-07
&quot;HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame.&quot;
PUBLISHED: 2020-07-07
&quot;HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy.&quot;
PUBLISHED: 2020-07-07
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Linked.php dv parameter.
PUBLISHED: 2020-07-07
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) software. Cameralyzer allows attackers to write files to the SD card. The Samsung ID is SVE-2020-16830 (July 2020).