Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Perimeter posted in February 2008
'Phone Flu' Could Infect Mobile Devices
Quick Hits  |  2/29/2008  | 
Researchers demonstrate ability of wireless devices to pass viruses through close proximity
Many Companies Short on Security Skills
Quick Hits  |  2/27/2008  | 
Enterprises increase demand for security expertise, but find their staffs in short supply
Hacker Steals Data on 18M Auction Customers in South Korea
News  |  2/26/2008  | 
Chinese attacker asks for ransom on data, reports say
New Tool Protects You From Antivirus Gone Wild
Quick Hits  |  2/26/2008  | 
German security firm releases product to plug little-known but dangerous holes in AV and email security
Agencies Fall Short on Protecting User Data
News  |  2/25/2008  | 
Government Accountability Office says many agencies still haven't met guidelines
'Live' VMs at Risk While in Transit
News  |  2/21/2008  | 
Black Hat researcher demonstrates how an attacker could gain control of a hypervisor when a VM is moved from one machine to another
Encrypted GSM Voice Calls & SMS Messages Hacked in Minutes
Quick Hits  |  2/21/2008  | 
Black Hat researchers have engineered a way to easily and cheaply crack GSM's encryption
Black Hat Researcher Hacks Credit Cards
News  |  2/20/2008  | 
Newly released tool grabs credit card account ID data off magnetic strips, RFID chips
Feds Wrestle With Security Threats
News  |  2/20/2008  | 
In Black Hat DC keynote, current and former government officials discuss emerging Internet threats
Ten Myths About Identity Fraud
News  |  2/12/2008  | 
Think ID fraud is running amok over the Internet? Are online credit card thieves your worst fear? Here's a dose of reality that may change your mind
BreakingPoint Systems to Upgrade Metasploit-Inspired Tool
News  |  2/12/2008  | 
Version 1.2 of tool BPS-1000 adds direct attacks, support for more apps, and IPv6
Hackers Turn Antivirus Site Into Virus Spreader
Quick Hits  |  2/11/2008  | 
AvSoft Technologies's SmartCOP site is hosting malicious code, researcher says
Turkish Hackers Take Out Top Porn Site
Quick Hits  |  2/8/2008  | 
Operators of RedTube still not sure how attackers broke in
The Coolest Hacks of 2007 - Part II
News  |  2/7/2008  | 
Just when you thought it was safe to go back online, we offer a new round of offbeat attacks that might make you think twice
Antivirus Inventor: Security Departments Are Wasting Their Time
News  |  2/6/2008  | 
About a third of current security practices are useless, according to ICSA chief scientist and Verizon exec
New Authentication Scheme Combats Keyloggers, Shoulder-Hacking
News  |  2/5/2008  | 
Carnegie Mellon University researchers' prototype keeps attackers in the dark during authentication
Too Much Access
News  |  2/4/2008  | 
New study shows that most companies still haven't solved the access governance problem - and their data may be at risk
MayDay! Sneakier, More Powerful Botnet on the Loose
News  |  2/4/2008  | 
Peer-to-peer MayDay botnet is stealthier and more powerful than Storm, researchers say
Employee Pulls Plug on Digital Bank Robbery
Quick Hits  |  2/1/2008  | 
Online transfer would have sucked "millions" from the bank's vaults; thieves are arrested


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21238
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping bec...
CVE-2021-21239
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. PySAML2 does not ...
CVE-2021-21253
PUBLISHED: 2021-01-21
OnlineVotingSystem is an open source project hosted on GitHub. OnlineVotingSystem before version 1.1.2 hashes user passwords without a salt, which is vulnerable to dictionary attacks. Therefore there is a threat of security breach in the voting system. Without a salt, it is much easier for attacker...
CVE-2020-4966
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the...
CVE-2020-4968
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192427.