Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Perimeter posted in June 2008
Cracking Physical Identity Theft
News  |  6/30/2008  | 
Social engineering expert reveals brick-and-mortar identity theft risks in banks, ISPs, and other firms
How to Control Spam Infiltration in the Enterprise
Quick Hits  |  6/27/2008  | 
New report from Forrester outlines the latest anti-spam best practices for businesses
ISPs Join Hands to Battle Botnet-Driven Spam
Quick Hits  |  6/26/2008  | 
Messaging Anti-Abuse Working Group (MAAWG) maps out best practices for nailing spam without accidentally blocking legitimate email
Tech Insight: Finding Security-Sensitive Data - on a Shoestring Budget
News  |  6/20/2008  | 
Thanks to open-source tools, discovering the heart of your data doesn't always mean paying an arm and a leg
Stolen Healthcare, Airline Credentials Found on Servers
News  |  6/18/2008  | 
Researchers at Finjan say cybercriminals are looking beyond stolen credit card accounts
Could a Smartphone Solve the Notebook Security Problem?
News  |  6/18/2008  | 
Maybe instead of looking at them as a new problem, we should consider smartphones as a potential security solution
High-Profile Hackers Get Their Days in Court
News  |  6/16/2008  | 
And in two cases, that day is followed by a whole bunch of days in the hoosegow
Study: IT Security Isn't as Good as It Thinks
Quick Hits  |  6/16/2008  | 
Many IT and security groups overlook key vulnerabilities, CDW study says
TD Ameritrade Settlement Hits Snag
Quick Hits  |  6/13/2008  | 
Court delays decision on class action case after plaintiff goes maverick
Email Surveillance Switch Pays Off at Brokerage
News  |  6/13/2008  | 
Frustrated by high rate of false positives, Scott and Stringfellow moves to Orchestria
IT Execs: Our Breaches Are None of Your Business
Quick Hits  |  6/12/2008  | 
More than 60% don't even want to tell the cops, much less the public
Verizon Study Links External Hacks to Internal Mistakes
News  |  6/12/2008  | 
Most breaches come from outside the company, but they are often triggered by unfound errors on the inside
American Airlines Warns of Phishing Scheme
Quick Hits  |  6/10/2008  | 
If you get a message from the airline promising $50 to answer a survey, don't answer it
Tumbleweed Acquired in Friendly Merger
News  |  6/9/2008  | 
New company to combine security services, business process modeling, B2B services
Tech Insight: Securing Wireless Communications
News  |  6/6/2008  | 
Wireless security often means protecting users from themselves
Report: Worldwide Spam Hits Highest Rate in 15 Months
Quick Hits  |  6/5/2008  | 
Spammers shift from email attachments to exploiting free hosted services, according to new MessageLabs research
Adware Pops to Top of May Threat List
Quick Hits  |  6/4/2008  | 
Trojan.Clicker.CM lets attackers bypass Norton popup blocker
Metasploit Hacking Tool Site Hacked But Not 'Owned'
News  |  6/4/2008  | 
Man-in-the middle attack redirects visitors to hacker's page
Gartner Details Real-Time 'Adaptive' Security Infrastructure
News  |  6/3/2008  | 
Future security model addresses arrival of multiple perimeters, mobile users
Army Hospital Breach May Be Result of P2P Leak
News  |  6/3/2008  | 
Data loss at Walter Reed exposed personal information on 1,000 soldiers
At Gartner Summit, Experts Question Security's Future
News  |  6/2/2008  | 
Analysts, sci-fi authors challenge security pros to rethink the status quo
Look Beyond Executable Files, Botnet Researchers Warn
Quick Hits  |  6/2/2008  | 
More and more botnets are recruiting zombies via everyday documents, researchers say

Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd