Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Security Monitoring posted in December 2013
RSA Denies Trading Security For NSA Payout
News  |  12/23/2013  | 
EMC security subsidiary accused of accepting $10 million from the NSA to purposefully use encryption for which the intelligence agency enjoyed backdoor access.
7 Reasons Why Bitcoin Attacks Will Continue
News  |  12/19/2013  | 
Cryptographic currency's rising value makes it an appealing target for cybercrime gangs and crimeware toolkit developers.
Target Confirms Hackers Stole 40 Million Credit Cards
News  |  12/19/2013  | 
Hackers' 19-day heist scoops up all ingredients required to make counterfeit cards.
My 5 Wishes For Security In 2014
Commentary  |  12/18/2013  | 
Security skeptic Dave Piscitello tells why his end-of-year InfoSec predictions are like a fine wine.
Advanced Power Botnet: Firefox Users, Beware
News  |  12/16/2013  | 
Malicious Firefox plugin scans websites for exploitable SQL injection vulnerabilities.
Protecting Brand And Data While Staying Social
News  |  12/14/2013  | 
Despite worries about social media, most companies are not monitoring it for threats
Zeus Banking Malware Gets 64-Bit Facelift
News  |  12/12/2013  | 
Crimeware toolkit developers follow the money, build new features into the notorious banking malware.
Time For An 'Active Defense' Against Security Attacks
Commentary  |  12/12/2013  | 
Today's threat landscape and the mobility of our data demand much more than a castle wall approach to keep hackers at bay.
Cybercrime Milestone: Guilty Verdict In RICO Case
News  |  12/12/2013  | 
Prosecutors use law designed to take down mobsters to fight online crime.
6 Tips To Secure Webcams, Stop Keyloggers
News  |  12/10/2013  | 
If the FBI can activate webcams silently and record keystrokes, so can attackers. Here's how to defend yourself.
DARPA Crowdsources Bug-Spotting Games
News  |  12/9/2013  | 
DARPA debuts five different puzzle games to test whether players can spot mathematical flaws in open-source code used by the Defense Department.
What Next-Gen Security Looks Like
What Next-Gen Security Looks Like
Dark Reading Videos  |  12/9/2013  | 
The nightmare of BYOD is giving rise to a new generation of intelligent, highly scalable security products and platforms.
IT Security Risk Management: Is It Worth The Cost?
Commentary  |  12/6/2013  | 
The attitude that IT security risk shouldn't be governed by traditional measures of cost and benefit is ludicrous.
NSA Fallout: Microsoft Rethinks Customer Data Controls
News  |  12/5/2013  | 
Fallout over NSA surveillance drives Microsoft to promise widespread security and privacy improvements. But do they go far enough?
Do Antivirus Companies Whitelist NSA Malware?
Commentary  |  12/4/2013  | 
Microsoft, Symantec, and McAfee fail to respond to a transparency plea from leading privacy and security experts.
Weighing Costs Vs. Benefits Of NSA Surveillance
Commentary  |  12/3/2013  | 
What the tech industry needs the NSA to know about aligning a national security agenda with the realities of a global Internet.
Zero-Day Drive-By Attacks: Accelerating & Expanding
Commentary  |  12/2/2013  | 
The zero-day attack business is no longer just about money, and patching is no longer the best defense.
5 Protocols That Should Be Closely Watched
News  |  12/1/2013  | 
Attackers frequently scan for open SSH, FTP, and RDP ports, but companies need to watch out for attacks against less common protocols as well


News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-1074
PUBLISHED: 2021-04-21
NVIDIA Windows GPU Display Driver for Windows, R390 driver branch, contains a vulnerability in its installer where an attacker with local system access may replace an application resource with malicious files. Such an attack may lead to code execution, escalation of privileges, denial of service, or...
CVE-2021-1075
PUBLISHED: 2021-04-21
NVIDIA Windows GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the program dereferences a pointer that contains a location for memory that is no longer valid, which may lead to code execution, denial of se...
CVE-2021-1076
PUBLISHED: 2021-04-21
NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys or nvidia.ko) where improper access control may lead to denial of service, information disclosure, or data corruption.
CVE-2021-1077
PUBLISHED: 2021-04-21
NVIDIA GPU Display Driver for Windows and Linux, R450 and R460 driver branch, contains a vulnerability where the software uses a reference count to manage a resource that is incorrectly updated, which may lead to denial of service.
CVE-2021-1078
PUBLISHED: 2021-04-21
NVIDIA Windows GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel driver (nvlddmkm.sys) where a NULL pointer dereference may lead to system crash.