Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in October 2011
Page 1 / 2   >   >>
Major Companies 'Fail' Social Engineering Test
News  |  10/31/2011  | 
Report details results of major social-engineering 'capture the flag' contest that targeted 14 companies in retail, airlines, food service, technology, and mobile services
Data Breach Costs: Beware Vendor Contract Fine Print
News  |  10/31/2011  | 
Organizations often end up paying the consequential costs of data breaches when third-party vendor contracts aren't scrutinized.
3 Steps To Make Your Database More Secure
News  |  10/28/2011  | 
Database security often takes a backseat to performance and other concerns. Here's how to strike a balance that works.
Social Malice: One In 60 Facebook Posts Are Malicious
News  |  10/28/2011  | 
LinkedIn users feel safest, according to new social networking data gathered by Barracuda networks--but not for long.
Innovative Attacks Treat Mobile Phones As Sensors
News  |  10/27/2011  | 
Recent research showed that a phone's accelerometer could detect vibrations from key presses on a nearby keyboard
SSL Servers No Match For Laptop-Based Hack
News  |  10/27/2011  | 
Tool lets hackers launch a denial-of-service attack from a single PC over a DSL connection.
6 Deadly Enterprise Security Mistakes
News  |  10/27/2011  | 
These small, subtle security mistakes can have big data breach consequences.
Stolen iPads A Special Problem For Fed Agencies
News  |  10/26/2011  | 
Mobile devices will inevitably go missing, as a recent theft at the VA shows. So security and device management work continues.
Tool Lets Single Laptop Take Down An SSL Server
News  |  10/25/2011  | 
Yet another strike against SSL security
UBS Finds Risk Management Stress Test Costly
Commentary  |  10/25/2011  | 
UBS failed to stop a single rogue trader from racking up $2 billion in losses. Yet, some experts argue that banks overall may be better than others at managing risk.
Nasdaq Server Breach: 3 Expected Findings
News  |  10/25/2011  | 
While federal investigators remain quiet about the ongoing investigation, experts say that the Directors Desk data breach is even worse than thought.
Hackers Likely Have Japanese Warplane, Nuclear Data
News  |  10/25/2011  | 
Attackers likely accessed sensitive data relating to military aircraft, missiles, and nuclear power plant designs and safety systems, said Japanese defense officials.
Pocket Guide To Securing Mobile Devices
News  |  10/24/2011  | 
With workers bringing their own smartphones and tablets into the company, IT security needs to focus on creating a more secure environment, not on securing each device
TDL4 Botnet Now Even Harder To Kill
News  |  10/24/2011  | 
Infamous botnet revamped to make its malware even more difficult for enterprises, security researchers, to detect
XML Encryption Flaw Leaves Web Services Vulnerable
News  |  10/24/2011  | 
Apache, Red Hat, IBM, Microsoft, and other major XML framework providers will need to adopt new standard, say German researchers who found the flaw.
Top FBI Cyber Cop Recommends New Secure Internet
News  |  10/24/2011  | 
Shawn Henry says current Internet will never be secure enough to beat hackers or meet the security needs of critical infrastructure providers.
Anonymous Attacks Child Pornography Websites
News  |  10/24/2011  | 
Hacktivist group disables numerous darknet child pornography sites, publishes 1,500 related usernames, and invites FBI and Interpol to investigate.
Metasploit For The Masses
News  |  10/21/2011  | 
New version of free Metasploit tool aimed at 'newbie' penetration testers
Does Cybercrime Pay?
Commentary  |  10/21/2011  | 
Turning a profit in today's underground economy remains tough. Here's why.
The Three Most Frequently Attacked Mobile Devices
News  |  10/21/2011  | 
Android devices, tablets, and jailbroken devices top list of riskiest mobile products in the enterprise setting.
Facebook: Latest 'Hack' Was Old, Invalid User IDs
News  |  10/21/2011  | 
Hacking group "Team Swastika" released apparent Facebook usernames and passwords, but the social network says the data isn't tied to live accounts.
NSA Chief Plays Offense on Cloud, Cybersecurity
News  |  10/20/2011  | 
Cloud has become a key part of the NSA's IT strategy, said Gen. Keith Alexander. Coming soon: A DOD offensive strategy for responses to cyberattacks and threats.
Are Your IT Pros Abusing Admin Passwords?
News  |  10/19/2011  | 
One in four IT professionals know of a coworker who has used privileged credentials to snoop. Worse, 25% of superuser passwords don't pass basic security test.
Banking Trojans Adapting To Cheat Out-of-Band Security
News  |  10/18/2011  | 
As financial institutions adopt out-of-band security, attackers quickly adapt
Researchers: 'Precursor' To Son Of Stuxnet Spotted In The Wild
Quick Hits  |  10/18/2011  | 
Process-control vendors, certificate authorities among those in the bull's eye for what might be prelude to a new Stuxnet attack, Symantec and McAfee say
Can Anonymous Cripple Critical U.S. Infrastructure?
News  |  10/18/2011  | 
Homeland Security says Anonymous can cause DDoS attacks, but says chance of attack on scale of Stuxnet is slim.
Slide Show: Signs That Malware Could Be On Your Mobile Device
News  |  10/17/2011  | 
Even healthy mobile phones can exhibit dodgy behavior, but there are some telltale signs that malicious software could be on board
Finding And Securing Sensitive Data In The Enterprise
News  |  10/14/2011  | 
Your organization's most valuable data may be stored in scattered – and insecure – locations. Here are some tips for identifying that data and making sure it doesn't leak out
Evolving Security Threats: Is Your SMB Ready?
News  |  10/14/2011  | 
A mix of common sense, employee education, and security tools can help SMBs identify and prevent social engineering scams and other emerging threats.
Blackhole Crimeware Goes 'Prime Time'
News  |  10/14/2011  | 
New HP OfficeJet phishing emails peaked at around 36,000 per minute on Wednesday.
New Version Of Zeus Leverages Peer-To-Peer Technology
News  |  10/14/2011  | 
Update could make it more difficult to take down fraud operations, researcher says.
VeriSign Withdraws Request To Suspend Malicious Domains
News  |  10/13/2011  | 
Proposed plan to scan domains and suspend those found to be malicious now dead in the water
New Version Of Zeus Leverages Peer-To-Peer Technology
News  |  10/13/2011  | 
Update could make it more difficult to take down fraud operations, researcher says
More Exploits For Sale Means Better Security
News  |  10/13/2011  | 
Selling exploits can help companies test their systems, but is there room for an independent market?
Air Force Says Drone Virus Is No Threat
News  |  10/13/2011  | 
An attack on the network that controls U.S. military unmanned aerial vehicles was only a "nuisance," military arm claims.
Advanced Threats And Scenario-Based Penetration Testing
Commentary  |  10/12/2011  | 
Why your pen-test efforts probably aren't preparing you for the worst
More Exploits For Sale Means Better Security
News  |  10/11/2011  | 
Selling exploits can help companies test their systems, but is there room for an independent market?
Your Other Compliance Problem: Third Party Vendors
News  |  10/11/2011  | 
All your internal compliance initiatives may be for naught if third parties that touch your regulated data expose vulnerabilities.
Social Media Can Hurt You In A Lawsuit
News  |  10/10/2011  | 
Social media postings could soon join email as a common part of the legal discovery process. Here's what SMBs need to know to protect themselves.
Feds Tighten Cybersecurity Policies To Stop Insider Threats
News  |  10/7/2011  | 
White House order aims to avoid another Cablegate by creating more agency oversight and security for data stored on classified networks.
Feds: Cloud Computing Doesn't Increase Security Risk
News  |  10/6/2011  | 
Administration officials tell Congress cloud security problems are no worse than other IT risks.
Steve Jobs And Tech Security
Commentary  |  10/6/2011  | 
Apple's products continue to highlight what relatively secure operating system environments look like.
Are Users Too Dumb For Security Awareness Training?
News  |  10/5/2011  | 
Too many security pros blame users for failing to remember the fundamentals that security awareness training teaches, but the real problem is that these programs just aren't very good
Most Businesses Don't Spot Hack Attacks
News  |  10/5/2011  | 
Congress hears testimony that most businesses are told by government agencies and law enforcement that they've been hacked, and that better security data sharing is needed.
Anonymous Threatens New York Stock Exchange Attack
News  |  10/5/2011  | 
Calls for distributed denial-of-service attack as part of the Occupy Wall Street protests.
6 SharePoint Security Challenges
News  |  10/5/2011  | 
Even Microsoft recommends locking down its popular and widely used collaboration, file sharing, and online publishing platform.
Microsoft: No Resurrection For Dead Botnets
News  |  10/4/2011  | 
The shutdown of Waledac 2.0 by Microsoft and Kaspersky aims to send a message, but also raises questions
Federal Cybersecurity Incidents Rocket 650% In 5 Years
News  |  10/4/2011  | 
As Obama administration declares October a time to focus on stopping cybersecurity threats, GAO releases a report indicating weaknesses.
Microsoft Still Mistaking Google Chrome For Zeus Malware
News  |  10/4/2011  | 
Despite Microsoft's emergency Security Essentials update, some users saw continued trouble Monday with Chrome reinstalls.
Military Health Plan Data Breach Threatens 4.9 Million
News  |  10/4/2011  | 
Tricare says lost backup tapes fall under FTC jurisdiction, not HIPAA, so only offers 90 days of fraud protection.
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.