Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'DeathRing' Malware Found Pre-Installed On Smartphones
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
12/12/2014 | 8:49:32 PM
Re: Pre-loaded malware is a lawsuit waiting to happen.
Yeah, but if products from Walmart, Sony, Samsung, and Asus are carrying this stuff in the US, it could be a big disaster waiting to happen.
CMILTON4529
CMILTON4529,
User Rank: Apprentice
12/10/2014 | 7:51:43 AM
Pre-loaded malware ; can it jump the gap and make it to the US
The big question is, can this systemic malware jump to the US for the many uncovered versions of Android ?
ODA155
ODA155,
User Rank: Ninja
12/8/2014 | 12:06:51 PM
Re: Pre-loaded malware is a lawsuit waiting to happen.
From everything I've read unless you live in Africa or some Asian contry and you're using a cheap or "knock-off" of a more popular phone you have nothing to worry about.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
12/7/2014 | 9:47:18 PM
Pre-loaded malware is a lawsuit waiting to happen.
I'd love to be the attorney on that deceptive trade practices class action!


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-4242
PUBLISHED: 2022-11-30
A vulnerability was found in Sapido BR270n, BRC76n, GR297 and RB1732 and classified as critical. Affected by this issue is some unknown functionality of the file ip/syscmd.htm. The manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the ...
CVE-2022-38801
PUBLISHED: 2022-11-30
In Zkteco BioTime < 8.5.3 Build:20200816.447, an employee can hijack an administrator session and cookies using blind cross-site scripting.
CVE-2022-38802
PUBLISHED: 2022-11-30
Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via resign, private message, manual log, time interval, attshift, and holiday. An authenticated administrator can read local files by exploiting XSS into a pdf generator when exporting data as a PDF
CVE-2022-38803
PUBLISHED: 2022-11-30
Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via Leave, overtime, Manual log. An authenticated employee can read local files by exploiting XSS into a pdf generator when exporting data as a PDF
CVE-2022-45842
PUBLISHED: 2022-11-30
Unauth. Race Condition vulnerability in WP ULike Plugin <= 4.6.4 on WordPress allows attackers to increase/decrease rating scores.