News & Commentary

Content posted in December 2012
Page 1 / 3   >   >>
Global Scans Reveal Internet's Insecurities In 2012
News  |  12/28/2012  | 
Researchers and attackers catalog vulnerable systems connected to the Internet, from videoconferencing systems set to auto-answer, to open point-of-sale servers, to poorly configured database systems
SSNs, Salary Information Exposed In Breach Of Army Servers
Quick Hits  |  12/28/2012  | 
'Unknown' attackers access databases of information on 36,000 people
How To Get Your MSSP In Line With Expectations
Quick Hits  |  12/27/2012  | 
Managed security service providers can help your organization save time and money -- if you know the right way to work with them
Better Integrate IT Risk Management With Enterprise Risk Activities
News  |  12/27/2012  | 
Not only will IT security risks be given greater attention, risk management could affect better business performance as a result
Rethinking IT Security Architecture: Experts Question Wisdom Of Current 'Layered' Cyberdefense Strategies
News  |  12/27/2012  | 
As attacks become more sophisticated and breaches abound, it's time for enterprises to change their cybersecurity thinking from the ground up, experts say
7 Top Information Security Trends For 2013
News  |  12/27/2012  | 
From sandboxing enterprise apps on mobile devices to hacking websites via high-bandwidth cloud attacks, experts detail the security trends they expect to see in 2013.
Don't Throw Away Your DAM Money
News  |  12/27/2012  | 
Make the most out of database activity monitoring through better tuning
Is Vulnerability Management Broken?
News  |  12/27/2012  | 
Some argue that it is time to rethink the vulnerability management hamster wheel
The Only Security Prediction That Matters
Commentary  |  12/26/2012  | 
In this silly season of year-end predictions, we need to collectively revisit the only prediction that will matter next year
Monitoring A La Borg
Commentary  |  12/24/2012  | 
What would a true infrastructure collective look like?
Protecting Data In The Cloud Without Making It Unusable
News  |  12/21/2012  | 
Encrypting data in the cloud is an important security step, but without the proper handling, it can make processing the data -- from searching to number crunching -- much more difficult
Report: U.S., Israel Fingered In Latest Data-Annihilation Attack
Quick Hits  |  12/21/2012  | 
But 'attribution obfuscation' impedes rooting out source of the attack
The 5 Coolest Hacks Of 2012
News  |  12/21/2012  | 
Nothing was sacred -- the nation's airspace, home power meters, videoconferences, and, in an ironic twist, popular cybercrime tools
Tech Insight: Using Penetration Tests To Gauge Real Risk
News  |  12/21/2012  | 
A quality pen test can ferret out the real risk that vulnerabilities pose to a company and its data
10 Biggest Information Security Stories Of 2012
News  |  12/21/2012  | 
From John McAfee's escape from Belize to the privacy debacle that compromised CIA director Petraeus' career, 2012 had no shortage of security shockers.
Google Privacy Convictions Overturned By Italian Court
News  |  12/21/2012  | 
Three Google executives had been convicted of violating Italian privacy law after a video of a boy being bullied was uploaded to Google Video.
Automated Malware Analysis Under Attack
News  |  12/20/2012  | 
Malware writers go low-tech in their latest attempt to escape detection, waiting for human input -- a mouse click -- before running their code
Of Mayans And Malicious Macros
Quick Hits  |  12/20/2012  | 
New attack poses as PowerPoint presentation on the end of the world
Windows 8 Security Stresses Exploit Prevention
News  |  12/20/2012  | 
A look at some of the key security features in the Microsoft's new OS
Forensic Tool Cracks BitLocker, PGP, TrueCrypt Containers
News  |  12/20/2012  | 
ElcomSoft's Forensic Disk Decryptor uses PC memory dumps to crack passwords associated with BitLocker, PGP and TrueCrypt archives.
Anonymous Continues Westboro Church Attacks
News  |  12/20/2012  | 
Hacktivist collective Anonymous gets help with attacks against Westboro Baptist Church, which pledged to picket funerals of shooting victims in Newtown, Conn.
BestBuy.Com Chief Leaves For Symantec
News  |  12/20/2012  | 
Former Starbucks CIO and 2011 InformationWeek Chief of The Year Stephen Gillett heads to Silicon Valley.
9 Ways Hacktivists Shocked The World In 2012
News  |  12/20/2012  | 
Despite the arrests of alleged LulzSec and Anonymous ringleaders, ongoing attacks -- including Muslim hackers disrupting U.S. banks -- prove hacktivism remains alive and well.
Making Database Security Your No. 1 2013 Resolution
News  |  12/20/2012  | 
How database-centric practices would change your security strategy and risk profile in the coming year
Cybercrime Inc.: The Business Of The Digital Black Market
News  |  12/19/2012  | 
Report by security vendor Fortinet examines the structure of the cyber underworld
New Apache Server Attack Discovered
Quick Hits  |  12/19/2012  | 
Exploit ultimately leads to theft of online banking credentials via Zeus variant
Attack Turns Android Devices Into Spam-Spewing Botnets
News  |  12/19/2012  | 
Beware Trojan app sending 500,000 spam SMS messages per day, charging messages to smartphone owners.
Securing SMB Online Transactions
News  |  12/18/2012  | 
Giving consumers the assurances they need to know they're securely sending their private information to your business
Data-Destruction Attack Targeted 'Few' Select Iranian Computers
Quick Hits  |  12/18/2012  | 
'Simplistic' data-destroying malware found on small number of targeted computers in Iran
The Identity Cliff
Commentary  |  12/18/2012  | 
Kicking the can down the road on identity cannot go on forever. Not choosing to deal with improving identity and access architecture is a choice
Anonymous Posts Westboro Church Members' Personal Information
News  |  12/18/2012  | 
Anonymous and other hackers have launched DDoS attacks and leaked personal information about group that promised to protest funerals of victims killed at Sandy Hook Elementary School.
Encryption Shortfalls Plague Healthcare Industry
News  |  12/18/2012  | 
Health Information Management and Systems Society report focuses on securing personal patient data, which providers must address in Meaningful Use Stage 2.
A Guide To Practical Database Monitoring
Quick Hits  |  12/18/2012  | 
A look at what database activity monitoring can and can't do, and some recommendations on how to implement the best system for your organization
Five Significant Insider Attacks Of 2012
News  |  12/17/2012  | 
From the recent theft of counterterrorism data from Switzerland's intelligence agency to remotely wiretapping boardroom videoconferencing systems, a number of attacks had an inside component
Mandatory Car 'Black Boxes' Proposed: Privacy Questions
News  |  12/17/2012  | 
NHTSA proposes that beginning in 2014, most cars would have to be fitted with data recorders. Consumer rights advocates say the measure includes few privacy protections.
Britain Declines To Prosecute Alleged NASA Hacker
News  |  12/17/2012  | 
After 10-year legal battle for allegedly hacking U.S. government computers in search of information on UFOs, British hacker Gary McKinnon is free.
Application Monitoring For Security Professionals
Quick Hits  |  12/17/2012  | 
Keeping an eye on applications can help your organization avoid data breaches. Here are some tips on how to do it right
Bromium Secures Older PCs, Terminals Via 'Microvisor'
News  |  12/17/2012  | 
CTO Simon Crosby says goal is to isolate untrusted tasks on Windows XP machines, thin clients as users bring outside code and content inside the enterprise.
You Are The Big Data
Commentary  |  12/15/2012  | 
Monitoring isn't just about systems anymore
U.S. Creates System To Look For 'Future Crimes'
News  |  12/14/2012  | 
In March, the United States granted counterterrorism officials the ability to hold data on Americans for up to five years. Now, the controversy surrounding the data-analysis program has come to light
Military Drones Present And Future: Visual Tour
Slideshows  |  12/14/2012  | 
The Pentagon's growing fleet of unmanned aerial vehicles ranges from hand-launched machines to the Air Force's experimental X-37B space plane.
How U.K. Police Busted Anonymous Suspect
News  |  12/14/2012  | 
Operation Payback operators' identities unearthed largely through "social leakage" -- highlighting differences between U.S. and British hacker investigations.
Bank Attackers Used PHP Websites As Launch Pads
News  |  12/14/2012  | 
WordPress sites with outdated TimThumb plug-in were among PHP-based sites hackers used to launch this fall's massive DDoS attacks, reports Arbor Network.
The Trouble With Security Metrics
News  |  12/13/2012  | 
A Q&A with the author of The Security Risk Assessment Handbook
Survey: Threat Intelligence Reports Play Key Role In Security Strategies
Quick Hits  |  12/13/2012  | 
Turns out enterprises really do read and take heed of security threat intelligence reports
In-Q-Tel Invests In Secure Smartphone Technology
News  |  12/13/2012  | 
Tyfone specializes in hardware, software for improved security in mobile and cloud environments.
Security Researcher Compromises Cisco VoIP Phones With Vulnerability
News  |  12/13/2012  | 
Grad student demonstrates how phones can be turned into listening devices by attackers
Bank Attackers Promise To Resume DDoS Takedowns
News  |  12/13/2012  | 
Silent for six weeks, the Cyber fighters of Izz ad-din Al qassam hacktivist group have promised to resume targeting banks, in protest of a movie that mocks the founder of Islam.
S.C. Security Blunders Show Why States Get Hacked
Commentary  |  12/13/2012  | 
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
McAfee Back In U.S.: Crazy Like A Fox?
News  |  12/13/2012  | 
Guatemala refuses asylum request and deports AV founder McAfee to Miami. Officials in Belize dismiss McAfee's claims that he's being persecuted by government, call him "bonkers."
Page 1 / 3   >   >>


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1067
PUBLISHED: 2018-05-21
In Undertow before versions 7.1.2.CR1, 7.1.2.GA it was found that the fix for CVE-2016-4993 was incomplete and Undertow web server is vulnerable to the injection of arbitrary HTTP headers, and also response splitting, due to insufficient sanitization and validation of user input before the input is ...
CVE-2018-7268
PUBLISHED: 2018-05-21
MagniComp SysInfo before 10-H81, as shipped with BMC BladeLogic Automation and other products, contains an information exposure vulnerability in which a local unprivileged user is able to read any root (uid 0) owned file on the system, regardless of the file permissions. Confidential information suc...
CVE-2018-11092
PUBLISHED: 2018-05-21
An issue was discovered in the Admin Notes plugin 1.1 for MyBB. CSRF allows an attacker to remotely delete all admin notes via an admin/index.php?empty=table (aka Clear Table) action.
CVE-2018-11096
PUBLISHED: 2018-05-21
Horse Market Sell & Rent Portal Script 1.5.7 has a CSRF vulnerability through which an attacker can change all of the target's account information remotely.
CVE-2018-11320
PUBLISHED: 2018-05-21
In Octopus Deploy 2018.4.4 through 2018.5.1, Octopus variables that are sourced from the target do not have sensitive values obfuscated in the deployment logs.