Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Mobile posted in May 2017
Mobile App Back-End Servers, Databases at Risk
News  |  5/31/2017  | 
Mobile app developers'casual use of back-end technology like Elasticsearch without security-hardening puts unsuspecting enterprises at grave risk of exposure.
Russian 'Cron' Cyber Gang Arrested for Raiding Bank Accounts
Quick Hits  |  5/22/2017  | 
Russian authorities arrest a group of 16 hackers who allegedly were attacking banks in their native country via mobile malware, nixing plans for their global expansion.
Deconstructing the 2016 Yahoo Security Breach
Commentary  |  5/19/2017  | 
One good thing about disasters is that we can learn from them and avoid repeating the same mistakes. Here are five lessons that the Yahoo breach should have taught us.
Android Users Fail to Run Latest OS Version
Quick Hits  |  5/18/2017  | 
A study finds 98% of Android devices are not running the latest software version, according to a report released today by Zimperium.
Study: Rooted Androids, Jailbroken iPhones Found in Enterprises
News  |  5/16/2017  | 
A study released today gives greater insight into some of the worst fears for security pros trying to manage employees' BYOD mobile phones.
'WannaCry' Rapidly Moving Ransomware Attack Spreads to 74 Countries
News  |  5/12/2017  | 
A wave of ransomware infections took down a wide swath of UK hospitals and is rapidly moving across the globe.
Jaff Ransomware Family Emerges In Force
Quick Hits  |  5/12/2017  | 
A new ransomware family is making the rounds in multiple high-volume spam campaigns over the past day, according to Cisco Talos.
'Systemic' Cyberattack Most Likely to Hit Financial, Energy Sectors
Quick Hits  |  5/10/2017  | 
The financial services industry is among the top five industries that likely face a systemic cyberattack, according to a survey released today.
FTC Launches Cybersecurity Resource Website for SMBs
Quick Hits  |  5/10/2017  | 
Federal Trade Commission website offers free tips and information for small businesses.
SLocker Ransomware Variants Surge
News  |  5/10/2017  | 
SLocker, one of the top 20 Android malware families, has seen a six-fold increase in the number of new versions over the past six months.
Hackers Face $8.9 Million Fine for Law Firm Breaches
Quick Hits  |  5/9/2017  | 
A federal court orders three Chinese nationals to pay $8.9 million in fines and penalties for hacking into two law firms and using stolen confidential information to trade stocks.
Android App Permission in Google Play Contains Security Flaw
Quick Hits  |  5/9/2017  | 
Android's app permission mechanisms could allow malicious apps in Google Play to download directly onto the device.
Shining a Light on Securitys Grey Areas: Process, People, Technology
Commentary  |  5/9/2017  | 
The changing distributed and mobile business landscape brings with it new security and privacy risks. Heres how to meet the challenge.
DHS Report Outlines Feds' Mobile Security Threats
Quick Hits  |  5/8/2017  | 
The US Department of Homeland Security sent Congress a study on mobile security threats facing federal government workers as well as recommendations for protection.
Law Firm Sues Insurer Over Income Loss in Ransomware Attack
Quick Hits  |  5/5/2017  | 
A Rhode Island law firm sued its insurer over failing to pay for lost income following a ransomware attack on the firm.
Backdoors: When Good Intentions Go Bad
Commentary  |  5/5/2017  | 
Requiring encrypted applications to provide backdoors for law enforcement will weaken security for everyone.
SS7 Flaws Exploited in Attacks Against Mobile Users' Bank Accounts
Quick Hits  |  5/4/2017  | 
Cyberthieves exploited long-known vulnerabilities in the Signaling System 7 (SS7) protocol, attacking bank accounts in Germany by intercepting two-factor authentication codes sent to mobile phones.
Healthcare Breaches Hit All-Time High in 2016
News  |  5/3/2017  | 
More than 300 healthcare businesses reported data breaches in 2016, but a drop in leaked records put fewer Americans at risk.


How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3318
PUBLISHED: 2021-01-27
attach/ajax.php in DzzOffice through 2.02.1 allows XSS via the editorid parameter.
CVE-2020-5427
PUBLISHED: 2021-01-27
In Spring Cloud Data Flow, versions 2.6.x prior to 2.6.5, versions 2.5.x prior 2.5.4, an application is vulnerable to SQL injection when requesting task execution.
CVE-2020-5428
PUBLISHED: 2021-01-27
In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer.
CVE-2021-20357
PUBLISHED: 2021-01-27
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194963.
CVE-2020-4865
PUBLISHED: 2021-01-27
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190741.