Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in September 2010
LinkedIn Attack Spreads Zeus Financial Malware
News  |  9/29/2010  | 
Infection related emails accounted for almost 25% of the world's spam at its peak Monday.
Microsoft Beefs Up Hotmail Security
News  |  9/29/2010  | 
Raft of new features aimed at blocking email hijackers and helping users reclaim compromised accounts.
Security Researcher Wins Prestigious MacArthur "Genius" Grant
News  |  9/29/2010  | 
Dawn Song, head of the Berkeley lab that developed BitBlaze, will get $500,000 for more research
Why The Insider Threat Is Ignored
Commentary  |  9/28/2010  | 
The insider threat is complicated, and most organizations do not fully understand the magnitude of the problem. There are three main reasons why the insider threat has been ignored: Organizations do not know it's happening, it's easy for organizations to be in denial, and organizations fear bad publicity.
Chinese iPhone 4 Forces Censored Maps
News  |  9/28/2010  | 
Apple's Maps application on the Chinese iPhone 4 will only show government-approved maps, unlike previous models.
Malware Targeting Top News Sites, Message Boards
News  |  9/28/2010  | 
By poisoning popular sites with malicious content, attackers ensure that web surfers are never more than two clicks away from a threat, says Websense report.
Security Is Chief Inhibitor To Web 2.0 Implementation, Study Finds
Quick Hits  |  9/27/2010  | 
Malware, viruses are key reasons why companies don't use Web 2.0 apps more widely, researchers say
Iran Denies Stuxnet Worm Hurt Nuclear Plant
News  |  9/27/2010  | 
The malware appears to have been designed to target a specific facility or control process.
'Here You Have' A Lesson
Commentary  |  9/24/2010  | 
It's been interchangeably called spam, or a targeted attack that spun out of control, or a form of cyber-jihad with alleged geopolitical implications. But regardless of what you call it, the "Here You Have" email worm is an excellent example of just how well today's security can work. Here are a few justifications for that optimism.
Facebook Suffers Slowdowns, Access Problems
News  |  9/23/2010  | 
The popular social network acknowledges some users may have difficulty accessing the site, but has yet to provide details of the cause.
Google, YouTube Win Copyright Ruling In Spain
News  |  9/23/2010  | 
Aggrieved media companies keep claiming copyright infringement but courts keep siding with Google.
Different Flavors Of The Insider Threat
Commentary  |  9/22/2010  | 
There are different categories of insider threats, based on the level of access the employee has. There are four types: pure insider, insider associate, insider affiliate, and outside affiliate. Each of these categories also has different motives. Understanding each is a key to building proper preventive and detective defenses.
Product Watch: eEye Revives Free Zero-Day Vulnerability Tracker Site
News  |  9/22/2010  | 
Aims to be a 'one-stop shop' for zero-day vulnerabilities, analysis
Twitter Worm Fixed
News  |  9/21/2010  | 
A cross-site scripting flaw that allowed several worms to spread on Twitter has been repaired.
Missing The Insider Threat
Commentary  |  9/20/2010  | 
"I trust everyone. It is the devil inside that I do not trust" is a great line from the movie "The Italian Job." Every single person has the potential to do harm if the right circumstances occur. Yes, this includes employees.
Stuxnet Updates Through P2P Communications
News  |  9/20/2010  | 
Symantec finds that peer-to-peer networks can propagate the malware, even though its command and control systems are now offline.
Adobe Accelerates Fix For Flash Flaw
News  |  9/20/2010  | 
Repair for the critical vulnerability, which is being actively exploited, will be released Monday rather than later this month.
Tech Insight: Employee Monitoring--Coming Soon To A Network Near You
News  |  9/17/2010  | 
More companies are monitoring and enacting policies to address employee Web and e-mail activity at work and off-hours
Social Engineering Report Shows Corporate America At Risk
News  |  9/15/2010  | 
Final report from Defcon contest details information employees gave up over the phone
Microsoft Patch Defends Against Stuxnet Worm
News  |  9/14/2010  | 
The company's September patch day brings nine security bulletins.
Adobe Facing Two Zero-Day Vulnerabilities
News  |  9/14/2010  | 
A warning on Monday about a vulnerability affecting Flash, Acrobat, and Reader echoes another software flaw disclosed last week.
Cisco Pinpoints 'Here You Have' Worm's Virulence
News  |  9/14/2010  | 
E-jihadist group claims responsibility for attack, which spread rapidly through poor enterprise webmail filters, open network shares.
Accepting The Inevitability Of Attack
News  |  9/13/2010  | 
Attacks will shift from targeting devices to targeting people, expert say
GAO Finds Agencies Lax On Data Protection
News  |  9/13/2010  | 
Departments that deal with highly sensitive information need better safeguards to secure it against contract workers, finds Government Accountability Office.
NSS Labs To Open Marketplace For Buying And Selling Exploits
News  |  9/9/2010  | 
No zero-days on 'Exploit Hub'
Federal Cyber Watchdog Bombs Cybersecurity Audit
News  |  9/9/2010  | 
Department of Homeland Security inspector general says US-CERT isn't properly patching and securing its systems or complying with policy.
Firefox Patches DLL Load Hijacking Vulnerability
News  |  9/9/2010  | 
Security release fixes 15 bugs and adds defense against clickjacking attacks.
Adobe Acrobat, Reader Under Attack From Zero-Day Exploit
News  |  9/9/2010  | 
Turning off JavaScript in Adobe Reader advised to protect against the critical vulnerability.
Twitter Patches Account Hijacking Vulnerability
News  |  9/8/2010  | 
Easy-to-exploit, one-click attack caught more than 100,000 users; additional variations may still be at large.
Symantec Finds 65% Have Been Hit By Cybercrime
News  |  9/8/2010  | 
Victims spent an average of 28 days and $334 fixing the damage, but few reported the crime to the police.
Quantum Cryptography Breached With Lasers
News  |  9/7/2010  | 
Using lasers to blind quantum cryptography photon detectors, Norwegian computer scientists were able to obtain a copy of a secure key without leaving any trace of their presence.
September Month Of Bugs Under Way
Quick Hits  |  9/7/2010  | 
Researchers say goal is to provide more details on some key known flaws, as well as expose some new zero-day vulnerabilities
Google Trims Privacy Policy
News  |  9/3/2010  | 
Moving to improve user privacy, Google has made it easier to understand the company's privacy policies and to find its privacy tools.
Tech Insight: Retooling Vulnerability Scanning, Penetration Testing For IPv6
News  |  9/3/2010  | 
Traditional host discovery via network scanning won't work with IPv6, but alternative methods are available
New Cloud Security Certification Launched
News  |  9/2/2010  | 
The Cloud Security Alliance (CSA), an industry group seeking to promote security standards for cloud computing, is offering an online certification program beginning September 1st.
DARPA Soliciting Bids On Insider Threat Prevention
News  |  9/2/2010  | 
Defense Department agency to develop system that can identify and stop people from removing information from its networks.


The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The State of Email Security and Protection
Mike Flouton, Vice President of Email Security at Barracuda Networks,  11/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprise
Assessing Cybersecurity Risk in Today's Enterprise
Security leaders are struggling to understand their organizations risk exposure. While many are confident in their security strategies and processes, theyre also more concerned than ever about getting breached. Download this report today and get insights on how today's enterprises assess and perceive the risks they face in 2019!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18881
PUBLISHED: 2019-11-12
WSO2 IS as Key Manager 5.7.0 allows unauthenticated reflected XSS in the dashboard user profile.
CVE-2019-18882
PUBLISHED: 2019-11-12
WSO2 IS as Key Manager 5.7.0 allows stored XSS in download-userinfo.jag because Content-Type is mishandled.
CVE-2019-18873
PUBLISHED: 2019-11-12
FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the pa...
CVE-2019-18874
PUBLISHED: 2019-11-12
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
CVE-2019-18862
PUBLISHED: 2019-11-11
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.