Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in May 2012
<<   <   Page 2 / 3   >   >>
How To Keep Your Users -- And Your Data -- Safe On The Web
News  |  5/18/2012  | 
Careless -- and occasionally malicious -- Web-browsing users might be the most serious threat to your organization's data. Here are some tips for keeping it safe.
Tech Insight: Practical Threat Intelligence
News  |  5/18/2012  | 
Today's ever-changing threat landscape requires proactive security efforts to identify threats and adapt defenses quickly
Twitter Adds Do Not Track Capability
News  |  5/18/2012  | 
FTC and Mozilla applaud as Twitter gives consumers tools to opt out of tracking.
Selling A Secure Internet Domain
News  |  5/17/2012  | 
PayPal among organizations invited to help shape security protocol for .secure that also can be used in existing domains
Facebook's History: From Dorm To IPO Darling
Slideshows  |  5/17/2012  | 
Facebook's IPO brings the world's most popular social network into Wall Street's big league. After a wild ride, Facebook's future depends on profiting from an increasingly mobile user base.
Manage Risk As A Strategy, Comply With Regulations As A Tactic
Commentary  |  5/17/2012  | 
Compliance alone should never be the only goal
Flashback Botnet Click-Fraud Operation Could Have Been More Profitable
News  |  5/17/2012  | 
The massive botnet of Mac computers left millions of dollars in potential profits on the table, researchers at Symantec say
Obama Cybersecurity Czar Schmidt Steps Down
Quick Hits  |  5/17/2012  | 
Howard A. Schmidt, the first-ever U.S. cybersecurity coordinator, has resigned and will retire later this month to enter academia
Iomega Unveils NAS Appliance For SMBs
News  |  5/17/2012  | 
StorCenter px12-450r networked attached storage appliance features Intel Ivy Bridge processor and incorporates McAfee VirusScan Enterprise for security.
Fake Google Chrome Installer Steals Banking Details
News  |  5/17/2012  | 
New polymorphic Android malware, meanwhile, disguises itself as a free virus scanner.
Robotic Arm Holds Promise For Paralyzed Soldiers
News  |  5/17/2012  | 
The Department of Defense and Veterans Affairs are involved in new research that demonstrates how an advanced prosthetic arm can be controlled by the human brain.
Threat Intelligence Becoming A Do-It-Yourself Project For Enterprises
Quick Hits  |  5/17/2012  | 
Building your own threat data collection and analysis function needn't be complex or expensive
SCADA/Smart-Grid Vendor Adopts Microsoft's Secure Software Development Program
News  |  5/16/2012  | 
Meanwhile, utilities lag when it comes to cyberattack preparedness and risk management at the executive and board level
Delete Data To Delete Risk
News  |  5/16/2012  | 
Smart data-retention policies allow an organization to rid itself of risky data when there's no need to keep it in the database anymore
6 Facebook Problems Need Fixing
News  |  5/16/2012  | 
After the IPO hoopla, there's work to do. Facebook might have 845 million users, but that does not mean building a business out of user attention will be easy.
Lumension Examines How To Close The Antivirus Protection Gap
News  |  5/16/2012  | 
New whitepaper examines and compares the effectiveness of standalone AV versus newer technologies
New Fraud Campaign Targets Facebook, Gmail, Hotmail, Yahoo Users
News  |  5/16/2012  | 
What the attacks share in common, besides being scams, is their use of a specific variant of Zeus
Time To Deploy The FUD Weapon?
Commentary  |  5/16/2012  | 
When suffering from compliance fatigue, you may have only one option to getting the funding you need to do your job
Zeus Malware Seeks Facebook Users' Debit Card Data
News  |  5/16/2012  | 
Latest Botnet-backed fraud compaign also has variations targeting Google Mail, Hotmail, and Yahoo users.
5 Ways To Lose A Malicious Insider Lawsuit
News  |  5/16/2012  | 
Making the case against an insider takes preparation and proactive work with HR and legal. Consider this expert advice to make sure you're ready.
Google Chrome 19 Debuts, With 20 Bug Patches
News  |  5/16/2012  | 
Latest release of browser also adds the ability to synchronize open tabs across devices.
5 Ways To Lose A Malicious Insider Lawsuit
News  |  5/15/2012  | 
Making the case against an insider takes preparation and proactive work with HR and legal
What A DDoS Can Cost
Quick Hits  |  5/15/2012  | 
Around 65 percent of IT pros say a DDoS costs their organizations $240,000 in lost revenue per day of the attack, and one-fifth say it would mean a loss of $1.2 million per day, new survey finds
Cyberspies Target Victims Via 'Strategic' Drive-by Website Attacks
News  |  5/15/2012  | 
Cyberespionage attackers more and more are injecting specific, legitimate websites with malware in hopes of snaring victims with common interests -- most recently, human rights organizations
Apple Inoculates OS X Leopard Against Flashback
News  |  5/15/2012  | 
Apple security update for older OS 10.5 Leopard nukes Flashback variants and disables outdated Java and Flash functionality.
Well Over Half The World's Computer Users Admit Pirating Software, BSA Study Finds
News  |  5/15/2012  | 
Emerging markets drove the commercial value of software theft to a new record $63.4 billion in 2011
Accused LulzSec Member Pleads Not Guilty
News  |  5/15/2012  | 
Alleged LulzSec lieutenant accused of masterminding Stratfor hack, along with numerous other charges. Jeremy Hammond, a.k.a. Anarchaos, served prison time for previous hacking incident.
ONC To Medical Practices: Get A Security Officer
News  |  5/15/2012  | 
An Office of the National Coordinator for Health Information Technology guide calls for medical offices to select a privacy and security officer.
Number Of Software Pirates On The Rise
News  |  5/15/2012  | 
Fifty-seven percent of respondents said they've pirated software, according to Business Software Alliance study
Network Security Technology Evolving Rapidly, Forrester Says
Quick Hits  |  5/15/2012  | 
Review of 17 product categories shows next-generation firewalls on the rise, stand-alone NAC on the wane
Microsoft Sees Cloud As SMB Security Cure
News  |  5/14/2012  | 
Microsoft pushing the idea that cloud services offer more cost-effective security for SMBs than the alternative.
Half Of Computer Users Admit To Pirating Software
News  |  5/14/2012  | 
Software pirates typically are young and male and live in emerging economies, where obtaining legal copies of software isn't always easy, finds Business Software Alliance study.
Why Some SMBs Still Fear The Cloud
News  |  5/14/2012  | 
Blind study commissioned by Microsoft shows disparity between those small to midsize businesses that have adopted cloud computing and security-as-a-service and those that have not
Military Transformers: 20 Innovative Defense Technologies
Slideshows  |  5/14/2012  | 
Department of Defense technologies under development, from brainy microchips to battlefield transformer vehicles, promise to make the U.S. military more nimble. Here's a visual tour of 20 breakthrough ideas.
As Facebook Preps For IPO, Privacy Tweaks
News  |  5/14/2012  | 
Irish and U.S. privacy audits prompt social network to make changes ahead of its IPO.
Websites Select Security Services To Suppress DDoS, Other Attacks
News  |  5/14/2012  | 
Web application firewalls are a popular way to protect sites, but cloud and managed security services offer strong benefits to protect against denial-of-service attacks and compromise
ID Theft, Online Fraud Rose Slightly In 2011
News  |  5/14/2012  | 
Internet crime reports increased 3.4% in 2011 as compared to 2010, finds Internet Crime Complaint Center. Some old scams remain popular.
4 Ways To Find Real Enterprise Security Threats
News  |  5/14/2012  | 
Companies re-prioritizing their defensive security efforts need to look beyond vulnerabilities. Here's advice on how to find the real threats to your business before they find you.
Amnesty International Hackers Learned From Flashback
News  |  5/14/2012  | 
Attackers used the same Java vulnerability employed by the Apple Flashback malware to try to infect site visitors with remote administration tools.
Dark Reading Launches New Tech Center On Threat Intelligence
Commentary  |  5/14/2012  | 
Subsite of Dark Reading will look at collection and analysis of data on emerging threats
4 Ways To Identify The Real Threats To Your Organization
News  |  5/14/2012  | 
Companies looking for better ways of prioritizing their defensive efforts need to look beyond vulnerabilities. How to find the real threats to your business before they find you
UNC Charlotte Breach Affected More Than 350,000
Quick Hits  |  5/14/2012  | 
Data compromise at university is much larger than initially thought, report says
Security Index Marks A Year Of Doing Business Dangerously
News  |  5/11/2012  | 
The Index of Cyber Security has measured top security officers' sentiment on cyberthreats for more than a year. So what does the index's steady rise mean?
Military Formalizes Defense Contractor Cybersecurity Program
News  |  5/11/2012  | 
Defense and Homeland Security Departments are expanding and formalizing the Defense Industrial Base program, an information-sharing effort aimed at helping defense contractors secure their networks.
TeamPoison Hacker Suspect Has Anonymous Ties
News  |  5/11/2012  | 
British police arrest alleged spokesman of hacktivist group that gained notoriety for exposing Tony Blair's address book and working with Anonymous as part of Operation Robin Hood.
BeyondTrust Buys eEye
Quick Hits  |  5/10/2012  | 
eEye co-founder Marc Maiffret now CTO of BeyondTrust
New .secure Internet Domain On Tap
News  |  5/10/2012  | 
'Safe neighborhood' top-level domain will require SSL, DNSSEC, and other security measures for websites
FBI Warns Travelers Using Hotel Networks About New Attack
News  |  5/10/2012  | 
The FBI says attackers are trying to trick users into installing malware with promises of software updates
Anonymous Targets Russian Sites For Putin Protest
News  |  5/10/2012  | 
Kremlin's public-facing website knocked offline; In separate series of attacks, Anonymous Norway dismisses claims it helped Norwegian police.
How To Use Service Providers To Manage DDoS Threats
Quick Hits  |  5/10/2012  | 
Distributed denial of service attacks can put your website and your businesss out of commission. Here are some tips on how to mitigate the threat
<<   <   Page 2 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-10-27
Skyworth Digital Technology Penguin Aurora Box 41502 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
PUBLISHED: 2021-10-27
In mymbCONNECT24, mbCONNECT24 &lt;= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts.
PUBLISHED: 2021-10-27
Race condition issues were found in Calibre at devices/linux_mount_helper.c allowing unprivileged users the ability to mount any device to anywhere.
PUBLISHED: 2021-10-27
PolarSSL versions prior to v1.1 use the HAVEGE random number generation algorithm. At its heart, this uses timing information based on the processor's high resolution timer (the RDTSC instruction). This instruction can be virtualized, and some virtual machine hosts have chosen to disable this instru...
PUBLISHED: 2021-10-27
An improper input validation vulnerability in Helpu solution could allow a local attacker to arbitrary file creation and execution without click file transfer menu. It is possible to file in arbitrary directory for user because the viewer program receive the file from agent with privilege of adminis...