News & Commentary

Content posted in April 2009
Page 1 / 3   >   >>
Despite Economy, Security Salaries Are On The Rise
Quick Hits  |  4/30/2009  | 
More than half of IT security pros got a raise in the past year, study says
Spam Close To 2 Year High: 85% Of Mail Now Spam
Commentary  |  4/30/2009  | 
Nobody really expected spam levels to stay low after the McColo takedown last year and, as a new MessageLabs report shows, they haven't. In fact, spam levels are as high as they've been in 19 months, crossing the 85% level for the first time since September '87.
New Tools Emerge To Ease Enterprise Fear Of Firewall Swapping
News  |  4/30/2009  | 
Replacing one vendor's firewall with another risks network disruption and could opens security holes, leaving many organizations to stick with the same firewall maker
Cloud Security Needs Its Rainmaker
Commentary  |  4/29/2009  | 
The Cloud Security Alliance (CSA) made its inaugural splash at last week's RSA Security Conference 2009 in San Francisco. The group kicked off an ambitious white paper that attempts to define everything from the architecture of cloud services to the impact of cloud services on litigation and encryption. It was a herculean effort to try to get this off the ground. And there is still much more work to do -- especially in the one area the group left out.
Cloud Antivirus Promises A New Approach From Panda Security
Commentary  |  4/29/2009  | 
The free software is designed to scan the cloud to collect antivirus signatures, leading to faster protection from the newest viruses and less load on end-user computers.
Trend Micro Acquires Third Brigade
Quick Hits  |  4/29/2009  | 
Buyout expected to boost Trend's cloud security, regulatory compliance offerings
Microsoft Alters Windows AutoRun Amid Conficker Concerns
News  |  4/29/2009  | 
As Conficker shows no signs of going away, software giant makes worm tougher to spread via USB
Panda Security Offers Free 'Cloud Antivirus'
News  |  4/29/2009  | 
The antivirus company says its approach protects against malware 100 times faster than traditional signature-based solutions.
Adobe Exploit Sheds Light On Bigger Risk Management Issue
Commentary  |  4/29/2009  | 
Batten down the hatches: It's zero-day exploitation time for Adobe Reader and Acrobat. But according to Adobe's blog post yesterday, "we are currently not aware of any reports of exploits in the wild for this issue." Is that the kind of statement you would feel comfortable taking to your CIO or CIS
Application Aware Storage and Protection
Commentary  |  4/29/2009  | 
In storage, its easy to forget that it is all about the application, especially when it comes to protection and more importantly recovery of that application. There is a wide variety of storage data protection from basic RAID to snapshots. There is an even wider variety of data protection software that provides multiple levels of protection, but between the two there is only rudimentary understanding of the application.
bMighty bSecure Virtual Event: SMB Security On A Budget - Today!
Commentary  |  4/29/2009  | 
When times get tough, it's all too tempting to push security concerns aside -- especially at small and midsize companies with shrinking IT budgets. Fortunately, you don't have to make that mistake, there are ways to address security issues without breaking the bank. Today -- Wednesday, April 29 -- the bMighty bSecure virtual event brings together business and security experts to show you how
Swine Flu Fears Fanned By Spammers
News  |  4/28/2009  | 
Some of these messages contain no malware or malicious links and appear to be information harvesting campaigns.
Federal Reserve IT Analyst Arrest Highlights Internal Threat
Commentary  |  4/28/2009  | 
I've always had a pick with the trite and hackneyed marketing hype among IT security vendors who repeated the "insiders conduct the most attacks," or "Insiders are the greatest risk." This most recent arrest stokes the debate that was rekindled with the recent release of Verizon Business' 2009 Data Breach Investigations Report.
Adobe Reader, Acrobat Hit With Another Zero-Day
News  |  4/28/2009  | 
Popular PDF plug-in becoming favorite target for attackers, prompting some security experts to recommend open-source alternatives
Fed Bank IT Worker Charged With Insider Data Theft
Quick Hits  |  4/28/2009  | 
IT employee allegedly used administrative access to collect co-workers' personal data and obtain bank loans in their names
SANS Tells Congress: Feds' Checkbook Is Cyberdefense 'Weapon'
News  |  4/28/2009  | 
Security experts in Senate hearing today debate whether the White House or Department of Homeland Security should head up U.S. cybersecurity strategy and operations
Swine Flu Outbreak Brings Out Swineflu Web Scams
Commentary  |  4/28/2009  | 
Swine Flu's making headlines and making people nervous, which is leading people to look for swineflu information on the Web. No surprise that the cybercrooks are setting up swine flu scam addresses and sites.
Just Because Security Budget Takes A Hit, Doesn't Mean Security Has To
Commentary  |  4/28/2009  | 
At last week's RSA Conference in San Francisco, there was as much talk about the economy as there was on IT security. And while the show appeared to pull a healthy number of attendees, at times the show floor seemed filled with more vendor reps and consultants, than IT buyers. But a few studies released last week show while vendor's may like to hype fear, the infosec economy certainly isn't all gloom and doom.
Privacy Policies Matter. No, Really. They Do.
Commentary  |  4/27/2009  | 
Forces as dissimilar as the Federal Trade Commission and Google seem to be aligning to reinforce the importance of protecting the privacy of your company's online customers.
Security Suffers Cuts In Recession, But Fares Better Than The Rest Of IT
News  |  4/27/2009  | 
Layoffs, cutbacks aren't as painful in security, but they are happening, studies say
Security Vendors Offer More Freebies, Deals To Existing Customers
News  |  4/27/2009  | 
Under increasing budget constraints and intensifying threats, organizations are asking their vendors for free, enhanced features and better deals -- and they're getting them
The Real Costs Of Laptop Loss
Commentary  |  4/27/2009  | 
How many movies have you seen where the bad guy is just about to get caught and interrogated when he bites down on a cyanide capsule and dies almost instantaneously? It's a pretty common scene that I've seen in movies as recent as "The Watchmen." Similar solutions, like virtual cyanide capsules, exist that can address lost or stolen electronic devices, and a study released by Intel and the Ponemon Institute last week highlights the importance of those products.
RSA's Five Big Takeaways
Commentary  |  4/27/2009  | 
Swag was scarce, attendee counts were down, and a few vendors opted not to exhibit this year, but last week's annual RSA Conference in San Francisco was still the obligatory get-together for security experts and vendors, sprinkled with loads of product and partner announcements and high-profile keynote speakers. The trouble with a show as large as the RSA Conference, of course, is that you can't see it all. So here's a synopsis of just some of the more memorable moments:
At RSA, Security Pros Don't Practice What They Preach
Quick Hits  |  4/27/2009  | 
AirPatrol study finds almost 100 unauthorized WiFi access points at convention
Will SSD Delay FCoE?
Commentary  |  4/27/2009  | 
In a recent entry we discussed the impact of Solid State Disk (SSD) on the IO infrastructure. Where SSD may have the most significant impact is on the adoption of 8GB fibre vs. Fibre Channel over Ethernet (FCoE). SSD has a performance profile that is worthy of the 10GB speeds of FCoE but will FCoE be adopted quickly enough by IT prior to SSD on 8GB Fibre establishing a foot hold?
The High Cost Of Not Spending On Security
Commentary  |  4/27/2009  | 
Slashing your security budget might be tempting in these tight times, but a security breach will cost you far more than you save. Recent IT spending surveys show that many tech leaders see security as a top priority whereas others are trimming security spending and putting their organizations at increased risk of a security breach.
Conficker Making Its Move, Finally
Commentary  |  4/26/2009  | 
After months of hype and, admit it it, hysteria, the Conficker worm has finally been getting getting down to work, spewing spam and pushing popups warning that the user's computers are infected (Ya think?) with viruses.
Splunk, GlassHouse Launch Joint Security Management Service
News  |  4/24/2009  | 
Partnership challenges SIEM, uses Splunk search engine to find source of security problems
Taking Some Of The Sting Out Of Data Breaches
Commentary  |  4/24/2009  | 
Anyone who has suffered a recent data breach involving regulatory or legislative data knows the investigation can be an excruciating process. The investigation is subject to time constraints as to how long it takes time to prepare and notify affected individuals. Statutes may apply to the company requiring customers to be notified within X number of days. And, of course, breaches never occur when it's convenient for the victim. So what can you do to streamline the investigative process and make
SANS: Newest WLAN Hacks Come From Afar
News  |  4/24/2009  | 
Expert warns of deadly combination of long-distance remote and wireless hacking to get inside an organization
Many Users Say They'd Sell Company Data For The Right Price
Quick Hits  |  4/24/2009  | 
In subway survey, 37 percent of workers say they could be bought
Poll: 65% Of Consumers Want Local Government To Do More About Cybercrime
Quick Hits  |  4/23/2009  | 
Cybercrime considered "serious" by 70 percent of U.S. adults
Security Expert Calls For New Model For 'Demonetizing' Cybercrime, Botnets
News  |  4/23/2009  | 
Current approach focused on fighting attacks is not working, says SecureWorks' Joe Stewart
Social Networks A New Security Frontline
Commentary  |  4/23/2009  | 
USA Today ran an interesting story about how cybercriminals are using social media in greater numbers to attack users. What started as a trickle last year has quickly sprung to an open fire hydrant, as criminals turn to low-paid grunts to crack captchas.
Savvis Launches Web App Firewall Service
News  |  4/23/2009  | 
New service could help companies meet WAF requirement under PCI
What Part Of Disaster Recovery Don't You Understand? (bMighty Wants To Know!)
Commentary  |  4/23/2009  | 
Disaster Recovery planning and preparation remains one of the great vulnerabilities of small and midsized businesses (and plenty of big businesses, too). Why do so many businesses avoid taking the time and spending the money to prep themselves for disasters that may never happen? The three most common answers are in that question.
Cybersecurity Balancing Act
News  |  4/23/2009  | 
Government IT pros struggle to meet mandates as computer system threats keep growing.
InformationWeek Analytics: Endpoint Security And DLP
News  |  4/23/2009  | 
A smart mix of policies, education, and new technologies like data loss prevention can help IT balance access and protection.
DeDupe Team Up
Commentary  |  4/23/2009  | 
There is a growing trend in storage lately, the concept of a manufacturer tapping another developer to help them compete in the market. This allows two smaller suppliers to team up against the larger suppliers. One of the best examples of this is NAS vendors adding deduplication functionality to their systems.
10 After-Tax-Filing Security Tips
Commentary  |  4/23/2009  | 
Filing your taxes isn't the end of the story. You've also got to be sure that you the electronic information you submit doesn't fall prey to identity theft. Think it can't happen to you? Tell that to the 10 million Americans who had their identity stolen last year.
Microsoft Details Windows 7 Security
Quick Hits  |  4/22/2009  | 
Features in upcoming OS reflect Microsoft's strategy of end-to-end trust
Third-Party App Updates, Unite!
Commentary  |  4/22/2009  | 
Unite, unite, UNITE! It's a great fight song being preached by Secunia at this week's RSA Conference. In "Secunia Pushes For Standard That Updates Consumer Apps," here on Dark Reading, Secunia's effort to unify patching was discussed with some interesting statistics from the recent Microsoft Incident Report. According to the report, 90 percent of vulnerabilities present on Windows system
Researchers Find Massive Botnet On Nearly 2 Million Infected Consumer, Business, Government PCs
News  |  4/22/2009  | 
More than 70 government-owned domains hit, and nearly half of the overall infections are in the U.S.
Symantec Rolls Out Small Business Offerings
News  |  4/22/2009  | 
Company also announces acquisition of Web security gateway appliance maker Mi5
Being Secure While Being Green
Commentary  |  4/22/2009  | 
Tossing out digital devices with data on them is a security risk. Disposing of digital devices improperly, with or without data present, is an environmental risk.
NSA Does Not Want To Lead U.S. Cybersecurity Efforts. This Is Good News
Commentary  |  4/21/2009  | 
Lt. Gen. Keith Alexander told a packed security audience here at the RSA Conference 2009 that the National Security Agency wants to help support the nation's critical IT security infrastructure efforts as part of a "team" effort. And that the NSA isn't interesting in the job of running the security of the critical IT security infrastructure.
Aladdin Introduces Clientless Smartcard Authentication Solution For Online Services
News  |  4/21/2009  | 
Aladdin eToken PRO Anywhere combines certificate-based authentication with plug-and-play simplicity
Analyzing Security Psychology
Commentary  |  4/21/2009  | 
The integration of psychology into the security strategic-thinking process is critical for the advancement of information security. The human element influences all security controls because all of these controls seek to regulate human behavior.
NSA Director: Agency Not Interested In Running U.S. Cybersecurity
Quick Hits  |  4/21/2009  | 
Lt. Gen. Keith Alexander tells security industry audience the National Security Agency wants to act as technical support in a "team" effort
Disappointed In Thin?
Commentary  |  4/21/2009  | 
In a recent review of Symantec's 2009 Stop Buying Storage Survey, an odd result on thin provisioning might get overlooked. 42% of users are essentially disappointed in their thin provisioning investment, and another 37% only indicated seeing moderate improvement. If you aren't in the small group that saw significant improvement, you may have invested in the wrong thin provisioning technology.
Page 1 / 3   >   >>


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Compliance and Risk Management Officer, AvePoint, Inc,  8/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15601
PUBLISHED: 2018-08-21
apps/filemanager/handlers/upload/drop.php in Elefant CMS 2.0.3 performs a urldecode step too late in the "Cannot upload executable files" protection mechanism.
CVE-2018-15603
PUBLISHED: 2018-08-21
An issue was discovered in Victor CMS through 2018-05-10. There is XSS via the Author field of the "Leave a Comment" screen.
CVE-2018-15598
PUBLISHED: 2018-08-21
Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable.
CVE-2018-15599
PUBLISHED: 2018-08-21
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
CVE-2018-0501
PUBLISHED: 2018-08-21
The mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.