Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

DarkReadingTim
Member Since: March 12, 2014
Strategist
Blog Posts: 1718
Posts: 238

posted in November 2006

16 items
New Threats Loom for 2007
News  |  11/30/2006  | 
Password-stealing sites, video malware, and a parasitic comeback top McAfee's list of predicted threats for new year
Security Appliance Delivers for Kenco
News  |  11/30/2006  | 
Logistics company gets the bigger picture with new appliance, software for security management
Stop Wasting My Time
News  |  11/29/2006  | 
Dark Reading survey shows frustrated security pros spend too much time on drudgery, not enough on important tasks
Spam Victims Get the Picture
News  |  11/28/2006  | 
Vendors warn of growing threat of spam embedded with image files that circumvent filters
The 10 Most Dangerous Things Users Do Online
News  |  11/17/2006  | 
If your end users only knew how much damage they could cause when they - well, maybe you should send them this article
Ex-IT Chief Busted for Hacking
News  |  11/16/2006  | 
Could former security-privileged employees be targeting your environment as well?
Zero-Days Top 2006 Attack List
News  |  11/15/2006  | 
Attackers' fondest desire is to develop an exploit that hasn't been patched yet, experts say
FTC Hammers on Freeware Distributor
News  |  11/14/2006  | 
Federal Trade Commission shuts down company accused of distributing spyware with its free goodies
Juniper Pushes TNC-Based NAC
News  |  11/13/2006  | 
Juniper baits network access control hook with emerging standards, but most enterprises aren't biting yet
Phishing Continues Meteoric Rise
News  |  11/10/2006  | 
Phishing's chart is on a hockey-stick curve, and users are the ones getting pucked
There Ought to Be a Law
News  |  11/9/2006  | 
Even with Congressional shakeup, experts don't expect any fast moves on compliance or computer crime law
E-Voting Hacks Facts
News  |  11/7/2006  | 
What every security pro should know about the potential for e-voting hackery
NAC-in-the-Box, Jump Up
News  |  11/6/2006  | 
Vernier, ConSentry launch improvements to their Network Access Control appliances
Anti-Spam's United Nations
News  |  11/3/2006  | 
StopSpam Alliance aims to bring regional anti-spam efforts together
Kicking Some Brass
News  |  11/2/2006  | 
Why isn't top brass more supportive of the security team? A new report identifies the problems - and what you can do about them
Built-in Headaches
News  |  11/1/2006  | 
PC hardware vendors are building security capabilities into their systems, but those features may present compatibility problems for IT


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4273
PUBLISHED: 2022-12-03
A vulnerability, which was classified as critical, has been found in SourceCodester Human Resource Management System 1.0. This issue affects some unknown processing of the file /hrm/controller/employee.php of the component Content-Type Handler. The manipulation of the argument pfimg leads to unrestr...
CVE-2022-4272
PUBLISHED: 2022-12-03
A vulnerability, which was classified as critical, has been found in FeMiner wms. Affected by this issue is some unknown functionality of the file /product/savenewproduct.php?flag=1. The manipulation of the argument upfile leads to unrestricted upload. The attack may be launched remotely. The exploi...
CVE-2021-32915
PUBLISHED: 2022-12-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.
CVE-2021-43864
PUBLISHED: 2022-12-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.
CVE-2021-43865
PUBLISHED: 2022-12-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.