Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in July 2011
<<   <   Page 2 / 3   >   >>
A 'Spooks And Suits' Red Team Game
Commentary  |  7/20/2011  | 
Social media apps meet national security
Ctera Links Cloud Storage With Data Protection
News  |  7/20/2011  | 
Appliance gives SMBs a cost-effective way to store data locally for speed, then replicate it in the cloud for disaster recovery.
OMB Issues Security Guidelines For Federal Telecommuters
News  |  7/19/2011  | 
Agencies should take 'immediate action' to outfit federal workers for teleworking
Yet Another Bank Sued By A Small Business For Fraudulent Hacker Transfers
News  |  7/19/2011  | 
According to Village View, Professional Business Bank says bank responsible for $465K loss to hackers, plus fees and damages suffered in online account breach
Many Android Apps Are Leaking Private Information, Researcher Says
News  |  7/19/2011  | 
In study of 10,000 Android apps, Dasient finds more than 800 might be compromising data
Black Hat USA 2011: Complete Coverage
News  |  7/19/2011  | 
A round-up of articles leading up to and live coverage from Black Hat USA 2011, July 30 to Aug. 4, Las Vegas
Murdoch's Sun Newspaper Hacked In The Name Of LulzSec
Quick Hits  |  7/19/2011  | 
FBI, meanwhile, arrests 14 'Anonymous' hacker suspects as LulzSec comes out of 'retirement'
DARPA Seeks To Learn From Social For Warfare
News  |  7/19/2011  | 
Agency aims to explore how the use of social media--particularly on mobile devices--can be used to help wage military campaigns.
LulzSec Hacks Murdoch's Sun, Cisco Sheds 6,500 Jobs
Commentary  |  7/19/2011  | 
LulzSec's retirees came out of self-imposed exile and played a mean game of bingo against Rupert Murdoch Monday.
More Windows Kernel Vulnerabilities May Emerge
News  |  7/19/2011  | 
After issuing dozens of patches this year, Microsoft may still have more work to do, Black Hat speaker warns.
Microsoft Offers $250,000 For Rustock Botnet Operator Identity
News  |  7/19/2011  | 
Bounty offered in response to evidence found in discovery process, Microsoft says.
More Windows Kernel Vulnerabilities May Yet Emerge, Researcher Says
News  |  7/19/2011  | 
After issuing dozens of patches this year, Microsoft could still have more work to do, Black Hat speaker warns
4 Basic Security Steps For SMBs
News  |  7/18/2011  | 
Time and budget limitations make poor excuses for a lack of security. Here are four key considerations for resource-constrained IT administrators at smaller companies.
Panda Security Launches Panda Cloud Office Protection 5.5 With New Tools For SMB Security
News  |  7/18/2011  | 
Panda Security’s endpoint security solution for SMBs now integrates remote access and support tools TeamViewer, UltraVNC, TightVNC, RealVNC and LogMeln
Telex Promises Path Around State-Sponsored Net Censorship
News  |  7/18/2011  | 
Tech researchers have developed a way that ISPs can help Internet users avoid censorship roadblocks.
Authorities Arrest More Than 100 Suspects In Romanian Internet Fraud Ring
Quick Hits  |  7/18/2011  | 
Organized sales of fake merchandise might have involved 21 offenders in U.S., FBI says
Feds Issue Government Teleworker Security Guidelines
News  |  7/18/2011  | 
OMB rules apply to departments, agencies that must secure access to wireless networks and IT systems when employees work remotely.
Microsoft Offers $250,000 Bounty To ID Rustock Botnet Operators
News  |  7/18/2011  | 
New tactic in response to evidence found in discovery process, Microsoft says
LulzSec Admirers Claim Attack On DISA
News  |  7/18/2011  | 
Taking its cue from LulzSec and Anonymous, hacker group strikes U.S. military agency network as protest against U.S. involvement in Libya, Afghanistan and Iraq.
Cyber Strategies: National Security Versus Child Pornography
Commentary  |  7/18/2011  | 
Among the interesting findings of an audit of the FBI's cyber crime capabilities: how Congress budgets the bureau, as well as the extent to which all cyber crime is local.
Bug Warnings: Vendor Security Bulletins Unclear
News  |  7/15/2011  | 
Adobe, Apple, and Oracle have been slammed by security experts for a lack of information, transparency, and clarity in security bulletins.
Attacks Focus DOD On Cybersecurity Partnerships
News  |  7/15/2011  | 
Defense Department's cyber strategy stresses government-industry collaborations, recognizing that the military operates in an interconnected world where cyber attacks continue to rise in frequency and severity.
Enemy At The Loading Dock: Defending Your Enterprise From Threats In The Supply Chain
News  |  7/15/2011  | 
The suppliers, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check
Invitations To Join Google+ Could Be Ruse To Steal Facebook Info, Researchers Say
Quick Hits  |  7/14/2011  | 
Emerging social network is subject of data-stealing scam, Barracuda reports
Pentagon Reveals Theft Of 24,000 Files From Unnamed Contractor
Quick Hits  |  7/14/2011  | 
Large files were extracted by a foreign government in March, Deputy Defense Secretary says
Court Case Tests Right To Withhold Passwords
News  |  7/14/2011  | 
The Department of Justice is attempting to compel a defendant to share her hard drive encryption key, which might violate her Fifth Amendment rights against self-incrimination.
Mobile Workers, Fast Threats Spur Demand For Cloud Security Services
News  |  7/14/2011  | 
Market for cloud security services will double in the next four years, study says
U.S. Military Outlines Cyber Security Strategy
News  |  7/14/2011  | 
The strategy focuses on bolstering the military's cyber defenses with new technology, new organizations, and new partnerships with the private sector and foreign allies.
EMC Gives Storage Management A Cloud Facelift
News  |  7/14/2011  | 
ProSphere updates storage management for the highly virtualized, cloud-based IT environment.
Breaches, Compliance Fuel Database Security Growth
News  |  7/14/2011  | 
Database activity monitoring gains attention, but market consolidation may be afoot.
Fueled By Compliance, Breaches, Database Security Market Evolving Rapidly
News  |  7/13/2011  | 
Database activity monitoring gains attention, but market consolidation might be afoot
Don't Foist Euro-Style Online Privacy On The U.S.
Commentary  |  7/13/2011  | 
As Congress debates numerous privacy bills, don't assume that the tougher protections afforded by EU law are the right model for the U.S.
Report: Sixty Percent Of Users Are Running Unpatched Versions Of Adobe
Quick Hits  |  7/13/2011  | 
Vulnerabilities in software could lead to breaches, Avast Software study warns
High-Tech Warfare: Army Plans To Modernize Battlefield
News  |  7/13/2011  | 
The military is launching a four-pronged approach to use technology to improve soldier performance and fill gaps in capabilities.
U.S. To Share Cybersecurity Info With Russia
News  |  7/13/2011  | 
Countries also plan to use existing crisis-prevention communications links between the two countries to establish protocols for communicating about cybersecurity
Microsoft Patches 'Critical' Bluetooth Vulnerability
News  |  7/13/2011  | 
Fix among 22 issues addressed by Patch Tuesday
Microsoft Squashes Bluetooth Bug
News  |  7/13/2011  | 
Patch Tuesday sees 22 Microsoft vulnerabilities fixed, while Mozilla pushes a Mac-only Firefox update.
P2P Networks Expose Healthcare Data To Identity Theft
News  |  7/13/2011  | 
File-sharing software can open healthcare organization networks to criminal activity.
Anonymous Takes Aim At Monsanto, Oil Companies
Quick Hits  |  7/13/2011  | 
New round of attacks focuses on private industry
Anonymous Hacks Booz Allen, Taps 90,000 Military Emails
News  |  7/13/2011  | 
Hacker group claims defense contractor is developing software for manipulating social networks
Have You Heard Of The Patriot Act?
News  |  7/12/2011  | 
Let's get this straight: Every cloud provider is obliged to follow the law and respond to court orders -- even Microsoft
U.S., Russia Forge Cybersecurity Pact
News  |  7/12/2011  | 
The two countries plan to regularly share information and improve communication on security, as part of Obama administration plan.
Antisec Attacks An Urgent Wake-Up: InformationWeek Now
Commentary  |  7/12/2011  | 
It's difficult to gauge the ethos of these next generation hackers. If I could summarize, it's this: Punish.
AntiSec Hacks Booz Allen, Posts Confidential Military Email
News  |  7/12/2011  | 
The hacktivist group claims it's stolen 90,000 email addresses and passwords from the defense contractor, among other internal data.
Federated Data And Security
Commentary  |  7/12/2011  | 
'Data virtualization' is a misnomer -- it's 'federated data.' Here's why it's important
Five Steps To Protect Against LulzSec
News  |  7/12/2011  | 
Targeted attacks are a reality today, especially with the likes of hacktivist groups such as Anonymous.
Microsoft Safety And Security Center Hacked To Present Porn
News  |  7/12/2011  | 
Attack only returned poisoned search results for very specific terms
Kiplinger Reveals Breach Of 142,000 Customer Accounts
Quick Hits  |  7/12/2011  | 
Database contained contact information, email addresses, and passwords, publisher says
Microsoft Security Center Delivered Adult Content Links
News  |  7/11/2011  | 
Attackers hacked search results generated by Microsoft's own search engine and served up some adult-oriented links.
Homeland Security: Devices, Components Coming In With Malware
News  |  7/11/2011  | 
Some imported components for electronic and computer hardware pose a complicated security risk, says the Department of Homeland Security.
<<   <   Page 2 / 3   >   >>

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.