Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in April 2012
<<   <   Page 3 / 3
Massive Mac Trojan Attack Still Under Way
News  |  4/10/2012  | 
New, free Flashback Trojan detection and removal tool available from Kaspersky Lab; snapshot of bot counts dropping
How Malware Gets Backed Up Along With Data
News  |  4/10/2012  | 
Malware is widely bypassing AV and other controls, getting backed up like any legitimate data, and re-infecting enterprise systems during restore.
Zeus Trojan Targets Online Payroll Services Providers
Quick Hits  |  4/10/2012  | 
New attack could be used for paying money mules from victimized corporate accounts
How To Become A Seasoned Security Specialist
News  |  4/10/2012  | 
Just ask Brian Duckering, once "a go-to guy for general IT" and now senior manager of Symantec's security endpoint management and mobility group
Utah Health Data Breach Affects Nearly 800,000
Quick Hits  |  4/10/2012  | 
Theft of Medicaid data in Utah may have been joint effort between hackers, insiders
Are Today's Risk Management Frameworks Antiquated?
News  |  4/10/2012  | 
Five ways ISACA is updating its compliance framework, COBIT, to keep up with business and risk demands
Europe's Data Security Laws Clear Some Clouds, Muddle Others
News  |  4/9/2012  | 
Regulations being mulled over by the European Union will clarify security requirements for many cloud providers -- but could hurt U.S. providers
Malware Getting Backed Up Along With Data
News  |  4/9/2012  | 
Sourcefire data shows how often restoring from malware-contaminated backups reinfects organizations
Data Security: Who's Winning The Cyberwar?
News  |  4/9/2012  | 
The growing sophistication of cyber-attacks and the proliferation of vulnerabilities resulting from the rise of mobile computing are forcing financial institutions to rethink data security and embrace new fraud-fighting techniques and technologies, including real-time monitoring.
How To Prevent Enterprise Data Leaks
News  |  4/9/2012  | 
Data can find its way out through accidents or malice. Here are some tips to keep your essential information secure.
9 Most Costly Financial Services Data Breaches
News  |  4/9/2012  | 
Global Payments breach, which affected MasterCard and Visa customers, is only the latest in string of hacks and data thefts that have cost financial institutions millions of dollars.
Anonymous Continues Barrage Of Government Hacks
News  |  4/9/2012  | 
Hacktivist group Anonymous continues string of cyber attacks on governments worldwide, with attacks on China, Tunisia, Uganda, and the United Kingdom in the last few weeks.
How Much Money Do You Need To Lose Before You Start Monitoring?
Commentary  |  4/9/2012  | 
At what point does turning a blind eye to the loss of revenue spark the inevitable conversation: 'Maybe we should be monitoring this infrastructure more closely?'
Big Mac Botnet Mostly Made Up Of U.S. Machines
Quick Hits  |  4/6/2012  | 
Major 'wake-up call' for Mac users as Apple OS X Java flaw exploit spreads
Tech Insight: Getting Ready For Data Loss Prevention (DLP)
News  |  4/6/2012  | 
DLP is a business issue requiring the co-existence of people and process with technology
Inside IT Security's New Reality: Damage Containment
News  |  4/6/2012  | 
More security experts and vendors are espousing the view that bad guys will eventually sneak into your corporate network, even your big data. Can your IT team contain the damage once the hackers arrive?
Estimating The Economics Behind BYOD Security
News  |  4/5/2012  | 
Find the hidden costs of BYOD to make appropriate financial and risk decisions
Quick-Start Guide: Compiling Mac-Robber For iOS Vuln Research
Commentary  |  4/5/2012  | 
How to compile, copy, and run mac-robber on jailbroken iOS devices
Phishers Use Web Analytics To Gauge Success
Quick Hits  |  4/5/2012  | 
Attacker targeting South American bank gathered statistics on what worked and what didn't in major phishing campaign, RSA says
Damage Mitigation As The New Defense
News  |  4/5/2012  | 
Containing the attacker in today's persistent threat environment
2 Healthcare Data Breaches Show Importance Of Encryption
News  |  4/5/2012  | 
Patient data from Howard University Hospital and California Department of Child Support Services wasn't fully encrypted, and one security expert wants to know why.
Mac Botnet Now 600,000 Infected Machines Strong
News  |  4/5/2012  | 
Apple has issued a patch for its version of Java, but critics say it should have acted sooner to contain a trojan variant called Flashback, which has infected an estimated 1% of all Macs.
New York Moves To Protect Health Data Privacy
News  |  4/5/2012  | 
Should a simple trip to the podiatrist unlock your lifelong medical history? As electronic medical records are shared, complex privacy questions arise, prompting a new state committee to tackle patient privacy and HIE data access questions.
State Department CIO: What's Changed Since WikiLeaks
News  |  4/5/2012  | 
State Department IT chief talks strategy and cybersecurity upgrades, 18 months after the leak of 260,000 sensitive diplomatic cables.
How To Prevent Data Leaks From Happening To Your Organization
News  |  4/5/2012  | 
Data can find its way out through accidents or malice. Here are some tips for keeping your essential information from walking out the door.
SQL Injection Still Slams SMBs
News  |  4/4/2012  | 
SQL injection attacks may have declined compared to other methods, but they are still a big concern among businesses large and small
SANS Survey: BYOD Widespread But Lacking Sufficient Oversight
Quick Hits  |  4/4/2012  | 
BlackBerry is still the No. 1 supported mobile device in organizations
First Google Android Bootkit Found
News  |  4/4/2012  | 
Security researchers at NQ Mobile say they have found the first piece of Android bootkit malware
Database Security On The Cheap
Commentary  |  4/4/2012  | 
A look at some free tools to help tackle database security
Anonymous Vs. DNS System: Lessons For Enterprise IT
Commentary  |  4/4/2012  | 
A rumored attack on the world's DNS servers by Anonymous failed to materialize. But the many enterprises still ignoring persistent weaknesses could learn from the defensive strategy.
9 Recent Data Breaches That Have Cost Financial Services Firms Big-Time
News  |  4/4/2012  | 
The details of these breaches are downright scary, or ingenious, depending on your point of view
Tracking And Measuring Cloud Providers' Security Performance
Quick Hits  |  4/4/2012  | 
Is your cloud provider meeting its promises for security? Here are some tips for finding out
Monitoring, Policies Needed To Catch Rogue IPv6 Traffic
News  |  4/3/2012  | 
With a growing number of devices supporting the next-generation network protocol, companies need to research and implement IPv6 security
Girls Around Me App: Not Today's Creepiest Stalker
Commentary  |  4/3/2012  | 
Was the Girls Around Me app tasteless and juvenile? Of course. But we should be far more concerned about being stalked by law enforcement agencies and our cell phone companies.
Global Payments Breach: Big Authentication Lessons
News  |  4/3/2012  | 
Weaknesses in knowledge-based authentication and mag-stripe are highlighted in security experts' examination of the breach that affected credit card customers.
Most Popular Internet Sites Consistently Serving Up Malware
Quick Hits  |  4/3/2012  | 
Study of Alexa's top 25,000 sites finds 58 serving drive-by downloads of malicious code
Will We Learn Authentication Lessons From Global Payments Breach?
News  |  4/3/2012  | 
Weaknesses in knowledge-based authentication and mag stripe highlighted in security experts speculation about the breach
Quick-Start Guide: Compiling Mac-Robber For Android Vuln Research
Commentary  |  4/2/2012  | 
How to compile, copy, and run mac-robber on rooted Android devices
<<   <   Page 3 / 3

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.