Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in September 2009
Page 1 / 3   >   >>
Microsoft Tests Container Approach In Chicago Data Center
News  |  9/30/2009  | 
Microsoft's new data center in Chicago runs servers packed in shipping containers to let it quickly add or remove capacity as it tries to compete with Google in online services.
Which Botnet Is Worst? Report Offers New Perspective On Spam Growth
News  |  9/30/2009  | 
Rustock might be biggest, but Grum is worst offender, MessageLabs study says
New Trojan Evades Banks' Anti-Fraud Systems
News  |  9/30/2009  | 
'URLZone' calculates how much money to steal from a victim's account without raising suspicion
U.K. Account Takeover Attacks Increased 207 Percent Last Year, Report Says
Quick Hits  |  9/30/2009  | 
Online banking fraud increases 132 percent as cybercriminals shift tactics
Password-Stealing Malware Spikes
Commentary  |  9/30/2009  | 
McAfee's recent report on malware has staggering numbers that are simply hard to believe, yet because I've been battling daily the very bots, Trojans, and scareware they researchers are talking about, I can't help but agree.
Cyber-Crime No Longer Smash and Grab
Commentary  |  9/30/2009  | 
Typically, banking customers discovered they'd been victimized by cyber-crime when they discovered their bank accounts emptied. No more. According to this report, online thieves are getting craftier at covering their tracks to go undetected for longer stretches of time.
Internet Has Never Been More Dangerous, Report Says
News  |  9/30/2009  | 
The Anti-Phishing Working Group reports record levels of fake antivirus software and other malware.
Stupid IRS Spam
Commentary  |  9/30/2009  | 
I believe that anyone who uses the Internet on a regular basis has to know that most e-mail messages are spam, and possibly part of a fraud scheme. I also realize that some people are more aware than others, and that some criminals are clever. But the current spread of an email message that claims to be from the IRS accusing a person of fraud demonstrates that naivete that runs deep on the Internet.
Disaster Recovery: SMBs Think They're Ready. Symantec Says They're Not.
Commentary  |  9/30/2009  | 
A new Symantec study of small and midsized business disaster recovery preparedness reveals a dramatic disconnect between DR beliefs and DR realities. Namely, most businesses are convinced they're prepared to recover from a disaster. Wrong.
Making Server Virtualization Storage More Scalable
Commentary  |  9/30/2009  | 
Storage scalability in a virtualized environment is quickly becoming a concern for some data centers. Unlike the very predictable single server world which had a single application, single NIC card and single host bus adapter, the virtualized host can have dozens of virtual machines and multiple network interface cards. This leads to a very unpredictable and random workload that can push storage controllers to their limits.
IRS virus demonstrates stupidity is rampant
Commentary  |  9/29/2009  | 
The proliferation of the current IRS virus demonstrates stupidity is rampant on the Internet.
Microsoft Bing Ads Warn About Scams
News  |  9/29/2009  | 
As part of its ongoing security push, Microsoft is teaming up with the government and Western Union to run search ads to educate users about potential online fraud.
Conficker Showdown: No End In Sight
News  |  9/29/2009  | 
Reinfected machines likely part of the 5.5 to 6 million-strong Conficker headcount
Microsoft Rolls Out Free AV
Quick Hits  |  9/29/2009  | 
Microsoft Security Essentials (MSE) changes AV market landscape
Taming The Threat From Within: Report
News  |  9/29/2009  | 
New Dark Reading report offers insight on how to keep your network safe from e-business partner risks
Microsoft Offers Free Security Essentials
News  |  9/29/2009  | 
New antivirus service could pose threat to paid entrants in the multibillion dollar PC security industry.
Security By Geography: Stop A Country With A Click
Commentary  |  9/29/2009  | 
I'm hoping that it's more than a mere reinforcement of America's most unfortunate xenophobic tendencies, but TechGuard Security's new PoliWall ESE security appliances take a geographic approach to SMB security by filtering IP according to their country of origin.
Dutch ISPs Sign Anti-Botnet Treaty
Commentary  |  9/29/2009  | 
Netherlands ISPs last month launched a joint effort to fight malware-infected computers and botnets -- fondly described by locals as a "treaty."
Metasploit Adds Exploit For Unpatched Windows SMBv2 Bug
Commentary  |  9/28/2009  | 
The upcoming stable release of Metasploit Framework version 3.3 is brimming with awesome new features that will make a lot of penetration testers happy. New features include the ability to take screenshots of exploited systems, while others add raw power, like being able to exploit the unpatched SMBv2 vulnerability in Windows Vista and Server 2008.
Is Mac Security Software Necessary?
News  |  9/28/2009  | 
Verizon is offering security software to its Internet service customers who use Macs. But is that something Mac users really need?
New NIST Report Sheds Some Light On Security Of The Smart Grid
News  |  9/28/2009  | 
First draft of Cyber Security Coordination Task Group report released
Nature Versus Hacker: Digital 'Ants' Swarm Malware In Research Project
Quick Hits  |  9/28/2009  | 
Method mimics how ants in nature fight threats en masse, digital ants successfully spot computer worm
Reducing The Storage Costs In Server Virtualization
Commentary  |  9/28/2009  | 
One of the most expensive components of a server virtualization project is the storage which it is attached to. This is one of the reasons that VMworld seems more like a storage event than a server virtualization event. One of the key themes from vendors at this years event was reducing the storage costs in server virtualization projects.
Hacking Gets Physical
Commentary  |  9/28/2009  | 
The guilty plea entered into federal court last week, by a contract IT worker, for disrupting a computer system used to monitor off-shore oil platforms shows that illegal hacking is likely to increasingly danger the physical world.
SMB Security Provider Sees $1 Billion Markets Becoming $100 Million Markets
Commentary  |  9/28/2009  | 
Walter Scott, CEO of Malta-based GFI Software, says that a combination of decreasing bandwidth costs and increasingly cost-conscious small and midsize companies are changing the security landscape.
Wolfe's Den Podcast: Trend Micro Takes Security To The Cloud
Commentary  |  9/27/2009  | 
Eva Chen, CEO and co-founder of Trend Micro, talks about what cloud-computing users should do to secure their data and how her company is itself using the cloud to protect against the explosion of malware.
PCI DSS Update Could Include Virtualization Security
News  |  9/25/2009  | 
PCI Virtualization Special Interest Group (SIG) is drafting guidelines and a mapping tool for applying PCI to virtualized systems
Online Bank Fraud: 5 Riskpoints Your Business Needs To Worry About
Commentary  |  9/25/2009  | 
How much do you know about the security habits, practices, technologies policies of your business's online bank and other financial services and institutions? Odds are, if Terry Austin of Guardian Analytics is right, it's nowhere near enough.
BeEF: XSS Vuln To Hack In Less Than 20 Characters
Commentary  |  9/25/2009  | 
As I'm finishing another successful Web application penetration test, I'm kicking myself for not noticing a new release of one of my all-time favorite Web hacking tools, the Browser Exploitation Framework (BeEF). BeEFis a fantastic tool for getting across to developers and Web admins the seriousness of vulnerabilities like cross-site scripting (XSS).
Cybercriminals Offer 43 Cents For An Infected Mac
Quick Hits  |  9/25/2009  | 
Sophos researcher offers a peek at the inner workings of an infamous Russian affiliate network
Debit Or Credit? Neither
Commentary  |  9/24/2009  | 
I stopped using my debit card altogether a couple of years ago out of an intense fear that I would never recoup the losses if my card were skimmed in the grocery-store line or compromised at TJ Maxx. Now I casually slide my checkbook onto the card reader stand and perform that rare act of putting pen to paper while trying to avoid the annoyed stares of shoppers behind me in line who may lose a few seconds off of their shopping time because I didn't use plastic.
Spuds And Spam: Idaho No. 1 Most Spammed State
Quick Hits  |  9/24/2009  | 
MessageLabs reveals list of U.S. states that get the most spam
Survey Says: PCI DSS Compliance Not Strategic
Commentary  |  9/24/2009  | 
That's right. A survey conducted by the Ponemon Institute, and backed by security firm Imperva, says that the vast majority of firms don't view the Payment Card Industry Data Security Standard (PCI DSS) as a strategic initiative.
Up To 9 Percent Of Machines In An Enterprise Are Bot-Infected
News  |  9/24/2009  | 
Most are members of tiny, unknown botnets built for targeting victim organizations
Spammers To Idaho: You're The Tops!
Commentary  |  9/24/2009  | 
Spam targeting is one of those categories you don't want to be Number One in, but somebody has to be. According to a new report from MessageLabs, the top spam targets in the U.S. live in Idaho. But the rest of the states aren't that much better off.
Full Disk Encryption Evolves
News  |  9/24/2009  | 
The Opal standard paves the way for hardware-based encryption.
Implementing Power Efficient Drives
Commentary  |  9/24/2009  | 
Most green storage methods really allow you to store more data in the same physical space, for the same amount of power consumption. To get serious about power efficiency you have to be able to turn things off. The ideal way to do this is have the drives either spin down or turn them off, but there is limited information about implementing power efficient drives.
Med Students 'Unprofessional' On Social Networking Sites
News  |  9/23/2009  | 
Today's Facebook and YouTube posts might catch up with tomorrow's doctors, a study published in a medical journal suggests.
Microsoft Posts Fix For SMB Vulnerability
News  |  9/23/2009  | 
A fix is available for the vulnerability in Microsoft's Sever Message Block software.
Google Urges Cooperation Against Bad Ads, Malware
News  |  9/23/2009  | 
A malicious ad surfaced in Google search results just as Google called for a more concerted industry effort against such scams.
Scareware And Bots Require Layered Defenses
Commentary  |  9/23/2009  | 
Defense in depth is not a new idea in security, but the importance of taking a layered approach is more important than ever. The current rise in infections by bots and scareware, along with recent reports on anti-malware endpoint protection, demonstrate how we need to be doing more at every layer.
Couple's Lawsuit Against Bank Over Breach To Move Forward
News  |  9/23/2009  | 
Case raises questions about banks' liability in breach of customers' online accounts
Department Of Defense Putting Data At Risk
News  |  9/23/2009  | 
Data deletion policies aren't being properly followed across the board, risking exposure of personal or sensitive data, report says.
PCI More Of A 'Check-Box' Than Security For Most Retailers
Quick Hits  |  9/23/2009  | 
New survey shows less than one-third of small businesses are PCI-compliant, while 70 of large businesses are
Credit Card Compliance Still Poorly Practiced
Commentary  |  9/23/2009  | 
A new survey from Imperva and the Ponemon Institute finds that despite the rising number of data breaches, many companies still do not fully adhere to compliance standards. And many of those that are protecting credit card information are neglecting security when it comes to other, equally sensitive data. Smaller businesses may be having the most trouble with the standards.
Security Software Market Remains Strong
Commentary  |  9/22/2009  | 
While the growth of the security software market took a hit this year, along with most every other market segment, it's still pegged to grow 8 percent, year over year, according to a market research firm. There's also stronger growth ahead.
The Search For A Perfect Corporate Password Policy
Commentary  |  9/22/2009  | 
What qualifies as a safe and sane password policy for your business? A recent blog post serves up some interesting answers to this question.
Trend Micro Gets Top Spot In New Anti-Malware Test
News  |  9/22/2009  | 
But even the best-performing product blocked only 70 percent of malware, NSS says
New Free Web Application Firewall 'Lives' In The App
News  |  9/22/2009  | 
Open-source project aims to put WAF control into application developers' hands
DoD Preparing To Lift USB Ban
Quick Hits  |  9/22/2009  | 
'Authorized' users and only DoD-approved, DoD-purchased thumb drives and other USB devices will be allowed
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-24
SiteServer CMS < V5.1 is affected by an unrestricted upload of a file with dangerous type (getshell), which could be used to execute arbitrary code.
PUBLISHED: 2022-05-24
SiteServer CMS V6.15.51 is affected by a SQL injection vulnerability.
PUBLISHED: 2022-05-24
SiteServer CMS V6.15.51 is affected by a Cross Site Scripting (XSS) vulnerability.
PUBLISHED: 2022-05-24
Business Logic Errors in GitHub repository erudika/para prior to 1.45.11.
PUBLISHED: 2022-05-24
Merchandise Online Store 1.0 is vulnerable to SQL Injection via /vloggers_merch/classes/Master.php?f=delete_product.