Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in July 2010
<<   <   Page 4 / 4
Analytics Slideshow: Expanding Profile Of Data Deduplication
Slideshows  |  7/8/2010  | 
Highlights of exclusive InformationWeek Analytics research as it appears in "Squeeze Play: The Expanding Profile of Data Deduplication," our exploration of technologies available to meet today's explosive demand for increased storage capacity in the data center.
Database Admin Gets 12 Months For Hacking Employer
News  |  7/8/2010  | 
Terminated for inappropriate conduct, a database administrator from Houston struck back at his former employer.
White House Spells Out DHS's Cybersecurity Role
Quick Hits  |  7/8/2010  | 
New memo from Obama's cybersecurity coordinator, Howard Schmidt, and the OMB shows wider responsibility for the Department of Homeland Security
NIST Updates Federal Cybersecurity Guidelines
News  |  7/8/2010  | 
National Institute for Standards and Technology simplified security assessment and control procedures to focus on near-real-time risk management.
University Databases In the Bull's Eye
News  |  7/8/2010  | 
Recent wave of university hacks nationwide exposes vestiges of former practice of using social security number as identifiers
Facebook Sued Over Privacy
News  |  7/8/2010  | 
German agency launched legal action against the social network for storing non-users' personal data gleaned through its address book sync feature.
Mobile Web Use Growing In U.S.
News  |  7/7/2010  | 
Use of non-voice data applications on mobile phones has grown dramatically over the last year with video recording experiencing the largest uptick in use.
No Sign Of Attacks Exploiting Latest Windows Zero-Day, Microsoft Says
News  |  7/7/2010  | 
Unpatched buffer overflow bug in Windows 2000 and XP revealed along with Vista, Windows 2008 flaws
Government Auditors Urge Clearer Cybersecurity R&D Strategy
News  |  7/7/2010  | 
The government needs better leadership and more cohesive direction on cybersecurity R&D, according to a new report from the Government Accountability Office.
More IT Pros Snooping Around Sensitive, Confidential Company Info
Quick Hits  |  7/7/2010  | 
One-third of companies say their intellectual property has been stolen
Fallen IBM Exec Merely Sought 'Business Clarity'
News  |  7/7/2010  | 
Bob Moffat says he was motivated by a lust for information, not money or sex, when he struck up affair with alleged co-conspirator.
Security On A Shoestring SMB Budget
News  |  7/7/2010  | 
As small and midsize businesses increasingly become big targets for cybercrime, locking down their networks cheaply can be a challenge
Cisco Surges To Intrusion Prevention System Lead
News  |  7/7/2010  | 
Infonetics predicts the IPS market will jump from about $800 million in 2009 to more than $1.2 billion in 2014.
Twitter Launches Earlybird Ads
News  |  7/7/2010  | 
Advertisers can pay to post discounts on products and services on the microblogging site's bargain hunting feed.
Internal Sabotage Security Risks Rising
News  |  7/7/2010  | 
Snooping by IT administrators is also increasing, according to a survey from Cyber-Ark Software.
PhoneFactor Launches Phone-Based Authentication For IBM Tivoli Access Manager
News  |  7/7/2010  | 
PhoneFactor integrates with Tivoli's directory system as well as AD and LDAP servers
How Intelligent Does Your Storage Need To Be?
Commentary  |  7/7/2010  | 
We have always counted on storage systems to provide software based services like snapshots, RAID protection, replication and thin provisioning, but now operating systems (OS) or file systems are offering much of those capabilities. Do we need the storage systems to offer them as well?
400 iTunes Accounts Hacked, Apple Admits
News  |  7/7/2010  | 
Hacker Thuat Nguyen used the information as part of an effort to boost his sales ranking on the App Store.
YouTube Confirms Justin Bieber Hack Attack
News  |  7/6/2010  | 
An XSS flaw made it possible for hackers to insert JavaScript and HTML code into the comments section of a YouTube page and redirect fans to pornography sites and post a fake message about the singer's death.
'Robin Sage' Profile Duped Military Intelligence, IT Security Pros
News  |  7/6/2010  | 
Social networking experiment of phony female military intelligence profile fooled even the most security-savvy on LinkedIn, Facebook, Twitter -- and also led to the leakage of sensitive military information
Botnet Viruses Target Symbian Smartphones
News  |  7/6/2010  | 
Nokia, Samsung and Sony Ericsson smartphones are among those running the two Symbian operating systems vulnerable to attack according to NetQin.
Report: Chinese Military Behind Google, Other Cyberattacks
Quick Hits  |  7/6/2010  | 
Most attacks traced to Chinese island tourist attraction that also houses state-of-the-art military installation
Apple App Store Suffers Hack Attack
News  |  7/6/2010  | 
Company insists user data has not been compromised, but is nonetheless advising customers to watch for suspicious transactions.
Microsoft Aims To Alleviate Health IT Cloud Concerns
News  |  7/6/2010  | 
Healthcare providers still have many reservations about the security of cloud computing for electronic medical records and mission-critical apps.
Senate Seeks White House Help On Cybersecurity Bill
News  |  7/6/2010  | 
In a letter to Obama, key senators have asked for administration support in crafting comprehensive cybersecurity legislation.
Most See Internet As Positive Social Force
News  |  7/6/2010  | 
In spite of security, privacy, and other concerns, 85% believe that the Web has and will continue to enrich their personal relationships, according to a Pew study.
China Online TV License Fees Surge
News  |  7/6/2010  | 
As more people turn to their computers to watch TV, copyright holders are generating an average of $7,400 per episode from video hosting sites to show a program.
Google VoIP App Draws Petition
News  |  7/6/2010  | 
Users of Google Voice call for the release of a voice-over-IP desktop client for Mac, Windows, and Linux PCs.
Slideshow: Next Generation Defense Technologies
Slideshows  |  7/2/2010  | 
DARPA develops leading edge technologies for use in national security and defense from quadruped robots that trek through remote terrain to small satellite modules for use in intelligence, surveillance, and reconnaissance.
Virtual Machines For Fun, Profit, And Pwnage
Commentary  |  7/2/2010  | 
Virtualization has turned the IT world upside down. It is used everywhere these days, from desktops to servers and data centers to the "cloud." It has also presented itself as a double-edged sword to security professionals.
Is Google Stealing Our Digital Freedom?
Commentary  |  7/2/2010  | 
With the Fourth Of July here, it's a good time to focus on freedom. It seems that often when new technology and new ways of getting revenue advance in an industry, those who don't understand that technology are exploited by those who do. Google's model seems to increasingly fit this mold, and the example it is setting is driving others down the same path.
Popular Windows Apps Reject Microsoft Security Features
Quick Hits  |  7/2/2010  | 
Some third-party applications aren't using Microsoft's Windows DEP, ASLR security
The Costs Of Finite Data Retention
Commentary  |  7/2/2010  | 
In closing out our series about keeping data forever we will examine the financial aspects of keeping data forever. What can be done to curtail costs and how does it compare to the more traditional finite data retention model? In this entry we will look at the costs of a finite data retention policy.
Six Messy Database Breaches So Far In 2010
News  |  7/2/2010  | 
From a National Guardsman's external hard drive faux pas to a financial services firm's slack practice of password-sharing, this year has already had its share of shocking database exposures
Amazon Acquires Woot
News  |  7/1/2010  | 
CEO Matt Rutledge says the online retailer that sells one item a day at a discount will continue to operate independently.
Herding Your Cats: Strategies For Securing Unstructured Data
News  |  7/1/2010  | 
When is a database not a database? When large volumes of sensitive data are stored in unstructured formats
Jobs Dismisses iPhone Complaints, Angers Users
News  |  7/1/2010  | 
Refusing to acknowledge a flaw in the iPhone 4 design, Apple CEO Steve Jobs' dismissive email exchanges with angry customers have drawn criticism.
Google Dashboard Now Showing Security Warnings
News  |  7/1/2010  | 
Hoping to make its cloud services more secure, Google is extending a Gmail security mechanism to other services.
'BlindElephant' To ID Outdated Or Unknown Web Apps, Plug-Ins
News  |  7/1/2010  | 
New freebie tool fingerprints out-of-date apps
The Kraken Botnet Returns
Commentary  |  7/1/2010  | 
The return of the Kraken botnet from its reported death in 2009 shows just how difficult squashing the botnet threat really is.
More Than 80 Percent of U.S. Enterprises Hit By Advanced Attacks
Quick Hits  |  7/1/2010  | 
Ponemon Institute survey shows 71 percent increase in attacks from unknown or stealthy attacks over the past 12 months
ClearanceJobs Launches 'Cleared Network' Service
News  |  7/1/2010  | 
Private online service combines specialized security job board with benefits of social networking
FEMA Cybersecurity Fix Could Take Years
News  |  7/1/2010  | 
Auditors find dozens of security problems with the Federal Emergency Management Agency's financial systems.
Healthcare CIOs Inattentive To Social Networking Policy
News  |  7/1/2010  | 
The latest round of Facebook privacy issues reinforces the importance of implementing and enforcing social networking policies and guidelines says a Garner analyst.
<<   <   Page 4 / 4

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.