First of all, you are trying to use a standard ACL which only supports a source. You must use a extended ACL which supports source and destination. So your ACL will look something like:
ip-access list 100 deny ip 192.168.10.0 0.0.0.255 10.0.0.0 0.0.0.255 logging
ip-access list 100 permit ip any any
You then need to apply that ACL to the source interface in question:
interface VLAN 1
ip access-group 100 in
So three things, use an extended ACL to support source and destination, apply another processing line in your ACL to permit ip; otherwise, it's an implicit deny (the ACL will process in order, so after the deny between the subnets, if you don't specify a permit, other subnets will be denied to talk to that subnet as well), and lastly, apply the ACL to the source interface.