Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in June 2010
<<   <   Page 2 / 5   >   >>
Hacker Accused Of Video Extortion
News  |  6/24/2010  | 
The FBI says that female victims were spied on with their Web cams and pressured to provide explicit videos.
Kyrgyzstan On Verge Of Cyberwar? Not So Much
Commentary  |  6/24/2010  | 
Cyberwarfare has become one of these buzzwords people just like to use. But in most cases -- it isn't used accurately.
Senators Say Cybersecurity Bill Has No 'Kill Switch'
News  |  6/24/2010  | 
The bill narrows existing broad Presidential authority to take over telecommunications networks according to the lead sponsors of the bill.
Google Remotely Deletes Two Apps From Android Phones
News  |  6/24/2010  | 
The security researcher who created the apps had misrepresented what the apps did, Google says.
WhiteHat Security Debuts Expanded Website Vulnerability Management
News  |  6/24/2010  | 
New features include user and role management options, additional enterprise reports
China Net TV Regulations Challenged
News  |  6/24/2010  | 
Television manufacturers and content providers are objecting to a requirement that they be licensed to provide non-broadcast services on Internet-capable sets.
Senate Working To Consolidate Cybersecurity Bills
News  |  6/24/2010  | 
Though legislative strategy for crafting a combined, comprehensive cybersecurity bill isn't yet clear
How Much Should You Spend On Security? Gartner Offers Some Answers
Quick Hits  |  6/24/2010  | 
Security drops to No. 9 on the list of IT priorities, research firm says
Google Wins Viacom Copyright Lawsuit
News  |  6/23/2010  | 
The ruling affirms the viability of sites that accept content from users.
Consolidating To A Single Service Provider? Watch Your Steps
News  |  6/23/2010  | 
Working with just one provider means choosing well -- and managing the relationship
Firefox 3.6.4 Adds Crash Protection
News  |  6/23/2010  | 
Third-party plug-ins will be isolated when they crash or freeze, allowing the browser to continue running with the option to restart plug-in content by refreshing the page
Google Finds Flaws In Android Security Report
News  |  6/23/2010  | 
SMobile Systems' suggestion that two-thirds of Android apps are 'suspicious' fails to consider Android's security mechanisms, Google says.
IBM Wins Smart Chip Contract
News  |  6/23/2010  | 
Big Blue's Burlington fab will produce security chips under contract from Infineon Technologies.
Social Networking Bill Of Rights Released
News  |  6/23/2010  | 
Privacy advocates seek comments on a 14-point plan for protecting users' personal information online.
Social Network Games At Risk In China
News  |  6/23/2010  | 
Planned regulations from the Chinese government would impose a $1.47 million fee for social network sites to register games.
Smartphones Taking Over Location Based Services
News  |  6/22/2010  | 
The number of navigation systems for smartphones is projected to reach 81 million this year and 297 million by 2014 according to market research firm iSuppli.
AT&T Delays iPhone 4 Retail Sale Date
News  |  6/22/2010  | 
Customers will be able to buy the Apple iPhone 4 June 29 on a first come, first-served basis while supplies last.
FBI Finds Suspects In Half Of Leak Cases
News  |  6/22/2010  | 
Despite its fairly successful record of identifying suspected intelligence leakers, the FBI suggests that public prosecution isn't always the best way to handle the situation.
Senators To Combine Cybersecurity Bills
News  |  6/22/2010  | 
Reforming the Federal Information Security Management Act and defining the role of the White House and other agencies are common themes in the multiple cybersecurity bills now circulating.
The Cache Value of SSD
Commentary  |  6/22/2010  | 
When I speak with IT Managers about Solid State Disk (SSD) one of the most common questions is how and where should it be implemented? There are many options but an extremely simple risk free way to get started is using SSD as a large cache in front of a disk array.
Adobe Flash Player 10.1 For Mobile Debuts
News  |  6/22/2010  | 
Long delayed and much disparaged, Flash Player 10.1 for mobile devices will finally be tested in the market place.
Palo Alto Introduces Security For Cloud, Mobile Users
News  |  6/22/2010  | 
GlobalProtect applies firewall policies to users when they use PCs, mobile devices and in the cloud.
Apple Sells An iPad Every Two Seconds
News  |  6/22/2010  | 
Company adds that developers have now created more than 11,000 apps specifically for the hot-selling new tablet.
Teens Engage In Risky Online Behavior
News  |  6/22/2010  | 
McAfee study finds teenagers often share personal information, including their name, location, or cell phone number, with strangers.
Secure Web Surfing With HTTPS Everywhere
Commentary  |  6/22/2010  | 
HTTPS Everywhere is a new Firefox extension that tries to make surfing the Web a little bit safer by ensuring that a secure connection is the default on many popular websites.
Internet Addiction Plaguing Chinese Youth
News  |  6/22/2010  | 
At least 33 million are hooked on Web gaming and other entertainment, finds a Chinese researcher.
Trend Micro Announces Hybrid SaaS Email Security
News  |  6/22/2010  | 
The InterScan Messaging Security Virtual Appliance combines a virtual appliance with SaaS-based inbound email security.
California Considers Electronic License Plate Ads
News  |  6/22/2010  | 
Advertisements would display only after vehicles were stopped for four seconds and could also be used to display public safety information such as Amber alerts.
Symantec SMB Study Shows Security Concerns Rising
News  |  6/21/2010  | 
SMBs rank information loss and online attacks as their leading worries with more than 40% losing data in the past year and more than 70% victimized by cyberattacks.
Open-Source Database Security
Commentary  |  6/21/2010  | 
A recent article on Dark Reading underscores a growing concern in IT: how to secure open-source databases.
Stock Manipulation Botnet Surfaces
Commentary  |  6/21/2010  | 
A Belgian federal investigation into an electronic bank account heist reveals a sophisticated attack designed to manipulate stock prices, a Belgian newspaper reported over the weekend.
Small And Midsize Businesses Getting Serious About Security, Study Says
News  |  6/21/2010  | 
Forty-two percent of SMBs have lost data; average cost per breach is more than $188,000
Google Introduces Command-Line Tool
News  |  6/21/2010  | 
A handful of Google services like Blogger and YouTube now accept a limited set of command-line instructions.
Internet Registrars Accused Of Supporting Online Criminals
News  |  6/21/2010  | 
A report issued on Monday claims Internet Registrars are knowingly facilitating illegal activity online.
Dell Launches Inspiron R Laptop
News  |  6/21/2010  | 
The PC is geared to home users and students, with quick access to photos, videos, and apps and an option that wirelessly streams the laptop's display to a compatible HDTV.
Fidelis, Cyveillance Team To Fight Cyber Threats
News  |  6/21/2010  | 
Fidelis is integrating its network security product, Fidelis XPS, directly with Anti-Malware and Anti-Phishing threat intelligence feeds from Cyveillance
Toshiba Unwraps Libretto Ultra Mobile PC
News  |  6/21/2010  | 
Hybrid mini-notebook / e-reader has dual touchscreens, runs on Windows 7, and has built-in Bluetooth 5 and 802.11n wireless networking.
Data Breaches Will Increase This Year, Security And Compliance Officers Say
Quick Hits  |  6/21/2010  | 
Majority of respondents also said their personal data is less secure
Domain Holders Shun China's .Cn
News  |  6/21/2010  | 
Regulations requiring .cn domain owners to show business licenses and photo IDs to Chinese authorities prompted a drop-off in new and renewing registrations.
Connecticut AG Investigating Google WiFi Incident
News  |  6/21/2010  | 
The inquiry into Google's Street View WiFi data gathering involves a significant number of states.
That Was Easy: New Tool For Web Form Password Brute Force Attacks
Commentary  |  6/21/2010  | 
Passwords suck. We all know it, but unless you can afford to provide multifactor authentication to all of your users and business partners, you're stuck with them.
Microsoft Sues Hotmail Spammer Again
News  |  6/21/2010  | 
The company's complaint claims the defendants created fake Hotmail accounts in order to sanitize their spam messages and make them appear legitimate.
China Strikes Back At Google
News  |  6/21/2010  | 
Google had characterized the Chinese government's Internet restrictions as a trade barrier.
PCI Standards Stretched To Three-Year Cycle
Quick Hits  |  6/20/2010  | 
PCI Standards Council adds an extra year between new payment card security requirements
Researcher 'Fingerprints' The Bad Guys Behind The Malware
News  |  6/20/2010  | 
Black Hat USA researcher will demonstrate how to find clues to help ID actual attackers, plans to release free fingerprinting tool
Adults Text While Driving More Than Teens
News  |  6/18/2010  | 
Almost half of all texting adults text while driving according survey findings that indicate only a third of texting teens sent or read a text message while behind the wheel.
Apple Updates MobileMe
News  |  6/18/2010  | 
The "Find My iPhone" app, which allows users to locate a lost iPhone, iPad, or iPod Touch, is one of several improvements to the Apple cloud-based service.
Looking For Vulns In All The Right Places? Experts Say You Might Be Missing A Few
News  |  6/18/2010  | 
Network-attached devices, paper documents, and your physical plant should be included in vulnerability scans, researchers warn
Supreme Court Rules Employers Can Read Employee Texts
News  |  6/18/2010  | 
Provided there is a “legitimate work-related purpose,” the court supports the right of employers to review an employee's text messages.
Cracked Wi-Fi Standards (Finally) Being Phased Out
Quick Hits  |  6/18/2010  | 
Standards groups say WEP, TKIP will no longer be allowed in interoperability tests
<<   <   Page 2 / 5   >   >>

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-11
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd(), while parsing a crafted XML file, performs incorrect memory handling, leading to a NULL pointer dereference while running strcmp() on a NULL pointer.
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.