Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in January 2011
<<   <   Page 4 / 4
Japan To Ban Virus Creation? Bad Idea
Commentary  |  1/5/2011  | 
The Japanese paper, the Yomiuri Shimbun, ran a story during the holidays about how the Japan Ministry of Justice wants to criminalize the creation of viruses. If they pursue this course, it's only going to get messy for security professionals there.
Dell To Acquire SecureWorks
News  |  1/4/2011  | 
Acquisition will enable Dell to launch managed security services
Microsoft Warns Of Windows Graphics Vulnerability
News  |  1/4/2011  | 
Disclosed last month, a flaw in the Windows Graphics Rendering Engine could be used to execute malicious code.
Going Out With A Bang
Commentary  |  1/4/2011  | 
We like to think that most firms have 'gotten the memo' that hackers hack databases, yet the flurry of breaches at years end suggests otherwise
New Stealth Rootkit Steals Windows 7, Server 2008 User Privileges 'On The Fly'
News  |  1/4/2011  | 
Researcher plans to hand off code to antivirus vendors, and then to EC-Council for ethical hacking training
Dell Adds Security To Its Acquisition Binge
Commentary  |  1/4/2011  | 
Dell today entered an agreement to acquire managed security services provider SecureWorks for an undisclosed sum. I didn't see this one coming, but I should have.
Mixing Tiers And Mixing Vendors In A Virtualized Environment
Commentary  |  1/4/2011  | 
VMware's Storage VMotion is a tool that brings the capabilities of virtual server migration to storage. Without interrupting users virtual machine data can be moved from one storage platform to another. It allows you to mix storage tiers and vendors more easily than in a non-virtualized environment. The missing link with this capability is all it can do is move data you need to know where to put that virtual machine.
Microsoft To Unveil Windows TV At CES?
News  |  1/4/2011  | 
Report says the software maker is looking to take on Apple and Google in the set-top box market.
Mobile Users Most Likely To Visit Phishing Sites
Quick Hits  |  1/4/2011  | 
New research finds eight times more iPhone users going to phishing sites than BlackBerry users
Homeland Security Details Critical Infrastructure Protection Strategy
News  |  1/4/2011  | 
The agency shares accomplishments and goals for protecting the U.S. electricity grid, power plants, and other control systems.
7 Ways To Save Microsoft In 2011
Commentary  |  1/4/2011  | 
If Redmond can't adapt to the most competitive landscape in decades, it will fall further behind Apple and Google in key growth markets like phones and tablets.
Hackers, Insiders Behind Most Identity Theft
News  |  1/4/2011  | 
Malicious activity topped human error as a cause of the 662 data breaches recorded in 2010 by the Identity Theft Resource Center.
IE Zero Day Flaw Leaked To Google Search
News  |  1/4/2011  | 
Log from security researcher's fuzzing engine found someone at a Chinese IP address searching for the exact Microsoft Internet Explorer attack signature.
Mining Web Proxy Logs For Interesting, Actionable Data
Commentary  |  1/4/2011  | 
Simple statistical analysis of Web proxy logs provides wealth of information and incidents missed by AV
TPM Authentication Is Out There, But Not Widely Used
News  |  1/4/2011  | 
Trusted Computing Group's hardware authentication technology pervasive, but rarely 'switched on'
Google Prepping Retail Mobile Payment Service
News  |  1/4/2011  | 
The service, based on near-field communication, would allow consumers to wave smartphones to pay for goods, use discount codes, say reports.
Top 3 Tools For Busting Through Firewalls
News  |  1/4/2011  | 
Can't access a Web site thanks to employer or government censorship? Fortunately, there's a host of tools and techniques that can help you slip through the blockade. Here's an in-depth look at three of the best.
Accidental Leak Reveals Chinese Hackers Have IE Zero Day
News  |  1/3/2011  | 
Google researcher's new fuzzer finds vulnerabilities in all browsers
Top 10 Security Predictions For 2011
News  |  1/3/2011  | 
More malware, botnets, and mayhem, including online protests and political attacks, are in store for this year, according to security experts.
HTC HD2 Hacked To Run MeeGo Linux
News  |  1/3/2011  | 
Developer Steven Troughton-Smith ported the open source operating system to the Windows Mobile smartphone.
New Trojan Could Be Trouble For Android Users
Quick Hits  |  1/3/2011  | 
Android malware is first to be able to receive instructions remotely and join botnets
For Hackers, 2011 Looks Like A Prosperous New Year
News  |  1/3/2011  | 
If you're an attacker, the new year is a target-rich environment. Here are five areas where you should shore up your defenses
<<   <   Page 4 / 4

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.