Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in February 2011

20 items
IE6 Finally Disappearing From The Web, Study Says
Quick Hits  |  2/28/2011  | 
After nine-year run, vulnerable browser is finally being replaced, according to Zscaler
Internet Crime Is On The Rise Again, Feds Say
Quick Hits  |  2/25/2011  | 
IC3 received more than 300,000 complaints in 2010 -- second-most ever
Report: Botnet Victim Population Grew More Than 600 Percent In 2010
News  |  2/23/2011  | 
Six of the top 10 botnets of 2010 did not exist in 2009, Damballa study says
Report: Social Networks Are The New Platform For Communications -- And Malware
Quick Hits  |  2/23/2011  | 
Email, IM fall lower on the list; malware authors take note and respond accordingly, Blue Coat says
Under Growing Pressure, Security Pros May Be Ready To Crack, Study Says
News  |  2/23/2011  | 
Faced with securing personal devices and a growing base of threats, security pros feel overwhelmed, (ISC)2 survey reports
BBC Sites Injected With Malicious iFrame
Quick Hits  |  2/17/2011  | 
Simply browsing the sites would be enough to cause infection, Websense says
New Group Seeks Dialogue On Security Data Sharing, Mining
News  |  2/15/2011  | 
Open Security Intelligence community champions methods for harvesting security information
Product Watch: Cisco Unveils New Security Architecture
News  |  2/14/2011  | 
Highly distributed architecture designed to enable "Borderless Networking" concept
Long-Patched Vulnerabilities Continue To Dominate Threat List
Quick Hits  |  2/13/2011  | 
Two of the top five most frequently observed flaws were patched more than five years ago, M86 study says
Google Introduces Two-Factor Authentication Option
Quick Hits  |  2/11/2011  | 
Users can now generate a second, one-time password for Gmail and other accounts using a mobile phone
'Night Dragon' Attacks Threaten Major Energy Firms
News  |  2/11/2011  | 
New advanced persistent threat (APT) attack combines a variety of vectors, seeks to steal sensitive data, McAfee researchers say
Enterprises Falling Short On App Security, Ponemon Study Says
News  |  2/9/2011  | 
Most organizations have been hacked, yet 88 percent still spend more on coffee than on app security
Researchers To Hit Major Website In Drive-By At RSA
Quick Hits  |  2/9/2011  | 
Speakers from Cenzic, Dasient will show how easy it is to infect a well-known site
Incidence Of Identity Fraud Down, But Consumer Costs On The Rise, Study Says
News  |  2/8/2011  | 
Criminals shift focus from simple card theft to new account fraud, according to Javelin
Nasdaq Says Web-Facing Application Was Compromised
News  |  2/7/2011  | 
Director's Desk infected with malware, but trading exchange unaffected, Nasdaq maintains
Forty Percent Of Users Curse PCs, But Only 3 Percent Smash Them
Quick Hits  |  2/7/2011  | 
Most users have at least wished for bad things to happen to their machines, Avira study says
'S3' Identity Theft Ring Busted In Brooklyn
Quick Hits  |  2/4/2011  | 
Feds arrest 27 in credit card forgery scam that compromised hundreds of bank accounts
Product Watch: AppRiver's SecureSurf Simplifies Malware Protection And Web Filtering
News  |  2/4/2011  | 
New service offers combination of DNS and proxy technology for Web filtering
SenSage Opens Security Data To Off-The-Shelf Business Intelligence Tools
Quick Hits  |  2/2/2011  | 
Enterprises can use BI to help navigate and analyze logs and events, company says
Source Code From Older Kaspersky AV Products Posted On Web
Quick Hits  |  2/1/2011  | 
Company says the code is only a 'fragment' of an older version and had been disclosed previously

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.