Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in November 2008
<<   <   Page 3 / 3
Keys To Success Of Vulnerability Management
News  |  11/6/2008  | 
Follow these four principles: focus on output, align with business processes, integrate technologies, and leverage measurement.
Vulnerability Management That Works
News  |  11/6/2008  | 
IT must align its program with business values in order to succeed.
Obama, McCain Campaign Computers Hacked
News  |  11/5/2008  | 
Tech experts at the Obama headquarters initially believed that the computer systems had been invaded by a computer virus.
Malware Attack Riding Coattails Of Obama Win
Commentary  |  11/5/2008  | 
Antivirus software maker Sophos today discovered attackers have launched a Web campaign of their own that aims to exploit the senator's presidential victory. And it's rather nasty.
Disgruntled IT Manager Sentenced For Hacking Former Employer
Quick Hits  |  11/5/2008  | 
Former IT chief gets a year for deleting company's Microsoft Exchange database
Web 2.0 Summit: Google, Wikipedia's Tips On Thwarting Spam Abuse
News  |  11/5/2008  | 
Panelists suggest using spam filtering services, "no follow" links, CAPTCHAs, patching religiously, and possibly even charging money to deter spammer registrations.
'Obama Trojan' Rides Coattails of President-Elect
News  |  11/5/2008  | 
Spam email promises video of 'amazing speech,' but instead delivers information-stealing malware
SSDs Are All About Latency
Commentary  |  11/5/2008  | 
Nearly every storage manufacturer has been articulating a solid state disk (SSD) strategy in the past two quarters. EMC, HP, IBM, HDS, NetApp, and Compellent are all set to add the capability to their offering. Some are doing so today, while others are still in the strategy mapping process.
The Importance of Exit Procedures
Commentary  |  11/5/2008  | 
There is an interesting article in the San Francisco Chronicle about a former IT manager turned "vengeful computer hacker" who logged in to his former company's mail server and turned it into an open mail relay for spammers to abuse. He also deleted the Exchange server's mail database and critical system files, preventing the server from being able to boot. After five years, he has fina
Virtual Worlds Riskier in Financial Crisis
News  |  11/5/2008  | 
Criminals 'follow the money' to where virtual and real-world economies converge
Adobe Issues Patch for Critical Reader Flaw
Quick Hits  |  11/4/2008  | 
Critical vulnerability could be used to exploit JavaScript engine in popular Reader application
Optical Scanning Machines, Not Just DREs, Giving Voters Trouble Today
Commentary  |  11/4/2008  | 
If voters do not even have confidence in the voting machines recommended by the Verified Voting Foundation, what hope have we in any voting system in use today?
Online Auction for Vulnerabilities Mulls Shutdown
News  |  11/4/2008  | 
WabiSabiLabi is considering closing the online marketplace for security vulnerabilities as it focuses on new line of unified threat management (UTM) appliances
Adobe Patches PDF Flaw
Commentary  |  11/4/2008  | 
Security firm Core Security Technologies is warning users that Adobe Reader versions 8.1.2 and earlier are vulnerable to specially crafted PDF files that could be used gain access to authorized systems. You might want to check which version of Adobe Reader you're using.
E-Voter In a Swing State
Commentary  |  11/4/2008  | 
When I arrived at the polls at 6 a.m. this morning, those of us at the head of the line watched nervously as election officials frantically tried to calibrate my small town's two e-voting machines after they malfunctioned -- just before the first voters were about to cast their votes.
Hackers May Be Able To Unlock Your Doors As Well As Your Data
Commentary  |  11/4/2008  | 
Now we may have to protect our physical security -- keys and locks -- from hackers. A new experiment suggests that web cam or cell phone images of keys may give crooks all they need to crack your locks.
Worm Exploiting Microsoft Windows Server Spotted
News  |  11/3/2008  | 
The vulnerability, which could allow a remote attacker to take over Windows computers without any user interaction, taps into the recent Microsoft Security Bulletin MS08-067.
Laptop Security During the Economic Crash
Commentary  |  11/3/2008  | 
Theft rates go up sharply when you have an economic crash. People are looking for items to take from homes and cars that are easy to transport and easy to sell. Laptops fall into this category because they are both small and easily sold -- especially if new, attractive, and one of the more desirable models. This suggests a number of best practices are necessary to ensure they don't walk off and, if they do, don't compromise the business.
Data Leakage Prevention Products Maturing?
Commentary  |  11/3/2008  | 
With new data loss stories cropping up every few days, it's surprising that the data leakage prevention (DLP) market hasn't blown up over the last year with organizations clamoring to get their hands on DLP technology to prevent their sensitive data from walking out the door, or getting left in a cab, or stolen out of a parked car. In the article "DLP Vendors Grow Up," Symantec's senior
Lock-Picking Made Easy: New Key Duplication Tool Demonstrates Physical Security Risk
Quick Hits  |  11/3/2008  | 
UC-San Diego researchers show that a photograph is all you need to duplicate a key
Sneaky Malware Hard to Kill
News  |  11/3/2008  | 
Microsoft's new Security Intelligence Report finds Trojan downloaders/droppers are on the rise, while viruses decline
Google Patches Android Security Flaw
News  |  11/3/2008  | 
The company's over-the-air update fixes a browser vulnerability that could enable hackers to gain access to information like saved passwords.
Primary Storage Data Reduction - A Process
Commentary  |  11/3/2008  | 
Primary storage data reduction is a series of steps you can take to reduce the amount of capacity dedicated to Tier 1 storage. The most common techniques are archiving, compression, data deduplication, and the use of intelligent storage systems. The question often comes up, what should I do first?
Windows Update To Get An Update
Commentary  |  11/3/2008  | 
According to the Microsoft Update blog, a substantial update to the Windows Update agent is on the way. The company says this update should increase the speed with which it will scan your system, as well as the number of patches it can download.
Microsoft: Malware Threats Up 43%
News  |  11/3/2008  | 
The software maker says that the spread of unwanted software is growing faster than ever.
The Security Pro's Guide To Thriving In A Down Economy
Commentary  |  11/3/2008  | 
Let's face it: Even if this isn't the worst economic crisis since the Great Depression, the financial engine clearly isn't running on all cylinders. At best we can assume some sort of recovery over the course of the next year or so, and at worst...well, I don't really want to think about that. I think it's safe to say that not only do none of us know where this is headed, but that the picture will remain opaque until after the election and the winners take office. As security professionals, ris
Inspector General Confirms It: Little HIPAA Enforcement
Commentary  |  11/2/2008  | 
The Health Insurance Portability and Accountability Act of 1996 was set into law about 12 years ago, the security rules went into effect earlier this decade. Hospitals knew these regulations were coming long ago, so why is compliance so lax?
<<   <   Page 3 / 3


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30485
PUBLISHED: 2021-04-11
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd(), while parsing a crafted XML file, performs incorrect memory handling, leading to a NULL pointer dereference while running strcmp() on a NULL pointer.
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.