News & Commentary

Content posted in December 2012
Page 1 / 3   >   >>
Global Scans Reveal Internet's Insecurities In 2012
News  |  12/28/2012  | 
Researchers and attackers catalog vulnerable systems connected to the Internet, from videoconferencing systems set to auto-answer, to open point-of-sale servers, to poorly configured database systems
SSNs, Salary Information Exposed In Breach Of Army Servers
Quick Hits  |  12/28/2012  | 
'Unknown' attackers access databases of information on 36,000 people
How To Get Your MSSP In Line With Expectations
Quick Hits  |  12/27/2012  | 
Managed security service providers can help your organization save time and money -- if you know the right way to work with them
Better Integrate IT Risk Management With Enterprise Risk Activities
News  |  12/27/2012  | 
Not only will IT security risks be given greater attention, risk management could affect better business performance as a result
Rethinking IT Security Architecture: Experts Question Wisdom Of Current 'Layered' Cyberdefense Strategies
News  |  12/27/2012  | 
As attacks become more sophisticated and breaches abound, it's time for enterprises to change their cybersecurity thinking from the ground up, experts say
7 Top Information Security Trends For 2013
News  |  12/27/2012  | 
From sandboxing enterprise apps on mobile devices to hacking websites via high-bandwidth cloud attacks, experts detail the security trends they expect to see in 2013.
Don't Throw Away Your DAM Money
News  |  12/27/2012  | 
Make the most out of database activity monitoring through better tuning
Is Vulnerability Management Broken?
News  |  12/27/2012  | 
Some argue that it is time to rethink the vulnerability management hamster wheel
The Only Security Prediction That Matters
Commentary  |  12/26/2012  | 
In this silly season of year-end predictions, we need to collectively revisit the only prediction that will matter next year
Monitoring A La Borg
Commentary  |  12/24/2012  | 
What would a true infrastructure collective look like?
Protecting Data In The Cloud Without Making It Unusable
News  |  12/21/2012  | 
Encrypting data in the cloud is an important security step, but without the proper handling, it can make processing the data -- from searching to number crunching -- much more difficult
Report: U.S., Israel Fingered In Latest Data-Annihilation Attack
Quick Hits  |  12/21/2012  | 
But 'attribution obfuscation' impedes rooting out source of the attack
The 5 Coolest Hacks Of 2012
News  |  12/21/2012  | 
Nothing was sacred -- the nation's airspace, home power meters, videoconferences, and, in an ironic twist, popular cybercrime tools
Tech Insight: Using Penetration Tests To Gauge Real Risk
News  |  12/21/2012  | 
A quality pen test can ferret out the real risk that vulnerabilities pose to a company and its data
10 Biggest Information Security Stories Of 2012
News  |  12/21/2012  | 
From John McAfee's escape from Belize to the privacy debacle that compromised CIA director Petraeus' career, 2012 had no shortage of security shockers.
Google Privacy Convictions Overturned By Italian Court
News  |  12/21/2012  | 
Three Google executives had been convicted of violating Italian privacy law after a video of a boy being bullied was uploaded to Google Video.
Automated Malware Analysis Under Attack
News  |  12/20/2012  | 
Malware writers go low-tech in their latest attempt to escape detection, waiting for human input -- a mouse click -- before running their code
Of Mayans And Malicious Macros
Quick Hits  |  12/20/2012  | 
New attack poses as PowerPoint presentation on the end of the world
Windows 8 Security Stresses Exploit Prevention
News  |  12/20/2012  | 
A look at some of the key security features in the Microsoft's new OS
Forensic Tool Cracks BitLocker, PGP, TrueCrypt Containers
News  |  12/20/2012  | 
ElcomSoft's Forensic Disk Decryptor uses PC memory dumps to crack passwords associated with BitLocker, PGP and TrueCrypt archives.
Anonymous Continues Westboro Church Attacks
News  |  12/20/2012  | 
Hacktivist collective Anonymous gets help with attacks against Westboro Baptist Church, which pledged to picket funerals of shooting victims in Newtown, Conn.
BestBuy.Com Chief Leaves For Symantec
News  |  12/20/2012  | 
Former Starbucks CIO and 2011 InformationWeek Chief of The Year Stephen Gillett heads to Silicon Valley.
9 Ways Hacktivists Shocked The World In 2012
News  |  12/20/2012  | 
Despite the arrests of alleged LulzSec and Anonymous ringleaders, ongoing attacks -- including Muslim hackers disrupting U.S. banks -- prove hacktivism remains alive and well.
Making Database Security Your No. 1 2013 Resolution
News  |  12/20/2012  | 
How database-centric practices would change your security strategy and risk profile in the coming year
Cybercrime Inc.: The Business Of The Digital Black Market
News  |  12/19/2012  | 
Report by security vendor Fortinet examines the structure of the cyber underworld
New Apache Server Attack Discovered
Quick Hits  |  12/19/2012  | 
Exploit ultimately leads to theft of online banking credentials via Zeus variant
Attack Turns Android Devices Into Spam-Spewing Botnets
News  |  12/19/2012  | 
Beware Trojan app sending 500,000 spam SMS messages per day, charging messages to smartphone owners.
Securing SMB Online Transactions
News  |  12/18/2012  | 
Giving consumers the assurances they need to know they're securely sending their private information to your business
Data-Destruction Attack Targeted 'Few' Select Iranian Computers
Quick Hits  |  12/18/2012  | 
'Simplistic' data-destroying malware found on small number of targeted computers in Iran
The Identity Cliff
Commentary  |  12/18/2012  | 
Kicking the can down the road on identity cannot go on forever. Not choosing to deal with improving identity and access architecture is a choice
Anonymous Posts Westboro Church Members' Personal Information
News  |  12/18/2012  | 
Anonymous and other hackers have launched DDoS attacks and leaked personal information about group that promised to protest funerals of victims killed at Sandy Hook Elementary School.
Encryption Shortfalls Plague Healthcare Industry
News  |  12/18/2012  | 
Health Information Management and Systems Society report focuses on securing personal patient data, which providers must address in Meaningful Use Stage 2.
A Guide To Practical Database Monitoring
Quick Hits  |  12/18/2012  | 
A look at what database activity monitoring can and can't do, and some recommendations on how to implement the best system for your organization
Five Significant Insider Attacks Of 2012
News  |  12/17/2012  | 
From the recent theft of counterterrorism data from Switzerland's intelligence agency to remotely wiretapping boardroom videoconferencing systems, a number of attacks had an inside component
Mandatory Car 'Black Boxes' Proposed: Privacy Questions
News  |  12/17/2012  | 
NHTSA proposes that beginning in 2014, most cars would have to be fitted with data recorders. Consumer rights advocates say the measure includes few privacy protections.
Britain Declines To Prosecute Alleged NASA Hacker
News  |  12/17/2012  | 
After 10-year legal battle for allegedly hacking U.S. government computers in search of information on UFOs, British hacker Gary McKinnon is free.
Application Monitoring For Security Professionals
Quick Hits  |  12/17/2012  | 
Keeping an eye on applications can help your organization avoid data breaches. Here are some tips on how to do it right
Bromium Secures Older PCs, Terminals Via 'Microvisor'
News  |  12/17/2012  | 
CTO Simon Crosby says goal is to isolate untrusted tasks on Windows XP machines, thin clients as users bring outside code and content inside the enterprise.
You Are The Big Data
Commentary  |  12/15/2012  | 
Monitoring isn't just about systems anymore
U.S. Creates System To Look For 'Future Crimes'
News  |  12/14/2012  | 
In March, the United States granted counterterrorism officials the ability to hold data on Americans for up to five years. Now, the controversy surrounding the data-analysis program has come to light
Military Drones Present And Future: Visual Tour
Slideshows  |  12/14/2012  | 
The Pentagon's growing fleet of unmanned aerial vehicles ranges from hand-launched machines to the Air Force's experimental X-37B space plane.
How U.K. Police Busted Anonymous Suspect
News  |  12/14/2012  | 
Operation Payback operators' identities unearthed largely through "social leakage" -- highlighting differences between U.S. and British hacker investigations.
Bank Attackers Used PHP Websites As Launch Pads
News  |  12/14/2012  | 
WordPress sites with outdated TimThumb plug-in were among PHP-based sites hackers used to launch this fall's massive DDoS attacks, reports Arbor Network.
The Trouble With Security Metrics
News  |  12/13/2012  | 
A Q&A with the author of The Security Risk Assessment Handbook
Survey: Threat Intelligence Reports Play Key Role In Security Strategies
Quick Hits  |  12/13/2012  | 
Turns out enterprises really do read and take heed of security threat intelligence reports
In-Q-Tel Invests In Secure Smartphone Technology
News  |  12/13/2012  | 
Tyfone specializes in hardware, software for improved security in mobile and cloud environments.
Security Researcher Compromises Cisco VoIP Phones With Vulnerability
News  |  12/13/2012  | 
Grad student demonstrates how phones can be turned into listening devices by attackers
Bank Attackers Promise To Resume DDoS Takedowns
News  |  12/13/2012  | 
Silent for six weeks, the Cyber fighters of Izz ad-din Al qassam hacktivist group have promised to resume targeting banks, in protest of a movie that mocks the founder of Islam.
S.C. Security Blunders Show Why States Get Hacked
Commentary  |  12/13/2012  | 
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
McAfee Back In U.S.: Crazy Like A Fox?
News  |  12/13/2012  | 
Guatemala refuses asylum request and deports AV founder McAfee to Miami. Officials in Belize dismiss McAfee's claims that he's being persecuted by government, call him "bonkers."
Page 1 / 3   >   >>


12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.
CVE-2018-17980
PUBLISHED: 2018-10-15
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is execute...
CVE-2018-18259
PUBLISHED: 2018-10-15
Stored XSS has been discovered in version 1.0.12 of the LUYA CMS software via /admin/api-cms-nav/create-page.
CVE-2018-18260
PUBLISHED: 2018-10-15
In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via /admin/media/upload?actions=false.
CVE-2018-17532
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.