Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in October 2010

22 items
New DDoS Trojan Attacks Sites That Criticize Vietnamese Communist Party
Quick Hits  |  10/29/2010  | 
Politically motivated attacks are becoming more sophisticated, researcher says
Identity Theft Council Aims To Bring 'Neighborhood Watch' Concept To Cybersecurity
News  |  10/28/2010  | 
Regional initiatives designed to attack security awareness problem at the grass roots
Small Vendors Driving Innovation In Security, Venture Capitalists Say
News  |  10/28/2010  | 
Major vendors dominate industry revenue, but startups and emerging vendors are the ones behind real change, panelists say
Vietnam Is Riskiest Country Domain, Study Says
Quick Hits  |  10/27/2010  | 
Bad guys say good morning, Vietnam, good night, Singapore
Emerging Qakbot Exploit Is Ruffling Some Feathers
News  |  10/26/2010  | 
Fast-spreading attack spreads like a worm, stings like a Trojan, RSA researchers say
Personal Data Of 280,000 At Risk Following Healthcare Breach
Quick Hits  |  10/25/2010  | 
Portable drive containing data on nearly 300,000 Medicaid patients in Pennsylvania is missing
Many Employees Attempt To Use Web Inappropriately, Study Finds
Quick Hits  |  10/22/2010  | 
One in five browser requests is blocked; one-third of workers frequently attempt to break policy
FBI Warns Of 'Corporate Account Takeover' Scams
News  |  10/21/2010  | 
Attacks on small and midsize companies can be financially devastating, agency says
The Office: Who Needs It
News  |  10/20/2010  | 
Sixty percent of employees in study say they don't need to go into an office to be productive; IT execs worry about security of mobile workers
Teens Still Engaging In Risky Behavior On Social Networks, Study Finds
Quick Hits  |  10/20/2010  | 
Eighty-two percent of parents say they wish they could delete information from their teens' accounts
Incidence Of Cybertheft Surpasses Incidence Of Physical Theft For The First Time, Study Says
News  |  10/19/2010  | 
Fraud-related losses rose 20 percent to $1.7 billion in the past year, Kroll study says
Facebook Under The Gun (Again) For Privacy Violations
Quick Hits  |  10/19/2010  | 
Third-party apps often share social network users' private data with others, report says
Security's Risk And Change Management Tools: Drawing A Picture Of Security Posture
News  |  10/14/2010  | 
Apps that track and manage change and configuration of firewalls and other security systems are finding a home as security and risk monitoring tools in large enterprises
Intrusions At Large Companies Up Sharply In 2010, Study Says
Quick Hits  |  10/13/2010  | 
More than two-thirds of large enterprises saw breaches this year, VanDyke reports
University Study Offers Recipe For Stealth Malware Attacks Via Social Networks
Quick Hits  |  10/11/2010  | 
'Stealing Reality' suggests that social net-based attacks could be more dangerous than traditional network attacks
Study: 81 Percent Of Children Have An Online Presence Before Age Two
Quick Hits  |  10/8/2010  | 
One-quarter of children are online before they're even born, AVG report says
University Researchers Develop New Technology To Trace Fraudulent Voice Calls
Quick Hits  |  10/7/2010  | 
Georgia Tech development could help tag 'vishing' calls and separate them from legitimate phone traffic
Product Watch: Symantec Launches New Reputation-Based Product Line
News  |  10/6/2010  | 
'Ubiquity' harnesses anonymous data from millions of installed Symantec products
Product Watch: Cisco Expands Borderless Networks Concept With New Security Products
News  |  10/5/2010  | 
New security appliance, firewall capabilities are among many products rolled out
Massive Phishing Attack Targets iTunes Customers
Quick Hits  |  10/4/2010  | 
Cleverly-crafted email tells users there is a problem with a purchase they haven't made, PandaLabs says
Five Indicted At Johns Hopkins Hospital For Identity Theft Scam
Quick Hits  |  10/1/2010  | 
Insiders allegedly used patient records to obtain more than $600,000 worth of credit
Security Researcher Wins Prestigious MacArthur "Genius" Grant
News  |  10/1/2010  | 
Dawn Song, head of the Berkeley lab that developed BitBlaze, will get $500,000 for more research

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.