Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Mobile posted in August 2011
New Free Tools Simplify Analysis Of Android Malware
News  |  8/31/2011  | 
What did you do over your summer break? Two graduate students wrote tools that address heightened concern over eventual attacks against the Android platform
One Third Of Security Pros Not Practicing What They Preach
Quick Hits  |  8/29/2011  | 
Survey shows security pros breaking security policies for convenience, and overall difficulty in making major changes to security technologies and strategies
Insulin Pump Hack Catches Congressional Attention
News  |  8/24/2011  | 
Members of the House communications and technology subcommittee raise concerns about vulnerability of wireless-based medical devices in wake of Black Hat USA demonstration
Baking Security Into Open WiFi Networks
News  |  8/22/2011  | 
New approach lets WiFi networks remain open and secure
GingerMaster Is First Malware To Utilize A Root Exploit On Android 2.3
Quick Hits  |  8/21/2011  | 
New attack can successfully avoid detection by antivirus programs, university research team says
Prospective 'Dog Wars' Players Get Malware Message From Animal Rights Activists
Quick Hits  |  8/17/2011  | 
Fake version of dog-bites-dog game contains a Trojan bearing animal rights messages
Product Watch: AirPatrol Launches New Way To Enforce Mobile Device Security
News  |  8/16/2011  | 
'Situationally aware' technology can turn mobile apps on and off depending on where the device goes -- and who's nearby
Thales Announces New Crypto Support For Mobile Payment Issuers
News  |  8/16/2011  | 
Solution loads payment applications onto mobile handsets
Study: Mobile Security Software Market To Grow Sixfold In Next Five Years
Quick Hits  |  8/10/2011  | 
Revenues from mobile security software will hit $3.7 billion by 2016, Juniper Research says
At Black Hat, Mobile Devices Under The Microscope
News  |  8/5/2011  | 
Security researchers find growing numbers of security vulnerabilities in smartphones
Likelihood Of Android Infection Has More Than Doubled In Six Months
Quick Hits  |  8/4/2011  | 
Thirty percent of mobile users are likely to click on an unsafe link, Lookout study says


How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3318
PUBLISHED: 2021-01-27
attach/ajax.php in DzzOffice through 2.02.1 allows XSS via the editorid parameter.
CVE-2020-5427
PUBLISHED: 2021-01-27
In Spring Cloud Data Flow, versions 2.6.x prior to 2.6.5, versions 2.5.x prior 2.5.4, an application is vulnerable to SQL injection when requesting task execution.
CVE-2020-5428
PUBLISHED: 2021-01-27
In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer.
CVE-2021-20357
PUBLISHED: 2021-01-27
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194963.
CVE-2020-4865
PUBLISHED: 2021-01-27
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190741.