Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in October 2011

13 items
Nearly A Third Of Execs Say Rogue Mobile Devices Are Linked To Their Networks
Quick Hits  |  10/30/2011  | 
Eighty-seven percent think their organizations are at risk of attack via a mobile security lapse
The Eight Traits Of Highly Successful Security Startups
Quick Hits  |  10/27/2011  | 
Best new companies are those that are willing to take a chance, SINET study says
Despite Stiffer Reporting Requirements, Many Agencies Still Slow To Implement Continuous Monitoring
News  |  10/22/2011  | 
New federal government guidelines mandate monthly reporting, but online security monitoring still isn't pervasive
Short On Staff, Many IT Organizations Feel Unprepared For New Threats
Quick Hits  |  10/19/2011  | 
Lack of resources causes many enterprises to lose security efficiency, Symantec study says
DDoS, Mobile Attacks Are Top Topics Of Discussion Among Hackers
Quick Hits  |  10/17/2011  | 
Study of large online forum finds that hackers have a wide variety of interests
New Version Of Zeus Leverages Peer-To-Peer Technology
News  |  10/13/2011  | 
Update could make it more difficult to take down fraud operations, researcher says
Sony Falls Under Attack Again As Hackers Crack 93,000 User IDs
News  |  10/13/2011  | 
"Only a fraction" of broken accounts show activity before gaming giant locks users out
Many Security Pros In The Dark About Their Own Environments, Study Says
Quick Hits  |  10/13/2011  | 
It's 9 a.m. Do you know how many Internet-facing servers you have? Many IT pros don't, according to a new RedSeal survey
Study: IT Execs Worried About Insider Threat
Quick Hits  |  10/12/2011  | 
Annual Amplitude/VanDyke survey also shows that attackers are targeting SMBs more frequently
Security Innovation Network Chooses Top 16 Emerging Companies
Quick Hits  |  10/11/2011  | 
Young security vendors recognized for 'potentially disruptive' technologies
White House Lays Out New Cybersecurity Guidelines
Quick Hits  |  10/7/2011  | 
Executive order is designed to secure information sharing, protect against future WikiLeaks-style data losses
Most Enterprises Face Increased Malware Risk From Social Media
Quick Hits  |  10/6/2011  | 
Fifty-two percent of companies say use of sites such as Facebook has caused more infections
Flaw In HTC Android Phone Exposes User Data, Researcher Says
Quick Hits  |  10/4/2011  | 
Attackers could steal GPS location, SMS data, and phone numbers; manufacturer says it is looking into the issue

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.