Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

DarkReadingTim
Member Since: March 12, 2014
Strategist
Blog Posts: 1718
Posts: 238

posted in April 2010

25 items
IT Pros Doubt Security Of Virtualized Environments, Study Says
Quick Hits  |  4/30/2010  | 
Majority of survey respondents don't think current security tools and practices will cut it in the cloud
Symantec Takes $370 Million Plunge Into Encryption Market
News  |  4/29/2010  | 
Acquisitions of PGP, GuardianEdge will make security giant an immediate player, experts say
Federal Agencies Wrestle With Cybersecurity's Harsh Realities
News  |  4/28/2010  | 
Sophistication of attacks, shortage of resources lead agency IT chiefs to focus less on perfect security -- and more on risk management
Costs Of Data Breaches Much Higher In U.S. Than In Other Countries, Study Says
News  |  4/28/2010  | 
Legal requirements for disclosure, notification add high expense to data compromise, Ponemon research says
More Than 40 Percent Of U.K. Users Say They Have Been Fraud Victims
Quick Hits  |  4/26/2010  | 
More than one-third of victims say they were never reimbursed by their banks
Qakbot Worm Steals 2 GB Of Confidential Data Per Week, Researchers Say
Quick Hits  |  4/23/2010  | 
Data-stealing W32.Qakbot worm continues to penetrate enterprises, Symantec says
Health Insurer Notifies More Than 409,000 Of Potential Breach
News  |  4/21/2010  | 
Sensitive medical records found on previously leased digital copier, company says
More Than One-Third Of Network Devices Show Vulnerabilities, Study Says
Quick Hits  |  4/21/2010  | 
Average device shows more than 40 configuration violations, according to research
Why Employees Break Security Policy (And What You Can Do About It)
News  |  4/20/2010  | 
Companies that monitor network behavior say many employees still break rules in order to get their jobs done
IT Isn't Keeping Up With End Users, Study Says
Quick Hits  |  4/19/2010  | 
Most organizations unable to keep up with users' job responsibilities and access rights, Ponemon study says
Politically Motivated Attacks Could Force Enterprises To Reshape Defenses
News  |  4/19/2010  | 
Targeted attacks could happen to any organization for myriad reasons, report says
Researcher To Demonstrate Uncrackable Encryption Key
Quick Hits  |  4/16/2010  | 
Scientist at Tel Aviv University builds key transmission system based on lasers, fiber optics
IE 8 Security Features Could Be Turned Against Users, Researchers Say
News  |  4/15/2010  | 
At Black Hat Europe, presenters show how filters designed to prevent cross-site scripting can be used to launch those very attacks
Identity Theft Ranks Among Consumers' Biggest Concerns, Study Says
Quick Hits  |  4/15/2010  | 
Concerns about ID theft are greater than fears over pandemics, inability to pay bills
Perceptions Of Security Vary Widely Between IT Management, Security Staff
News  |  4/14/2010  | 
Survey of federal government IT organizations could be indicative of many other large enterprises, Ponemon says
Many DLP Users Still Leaking Data, Survey Says
Quick Hits  |  4/12/2010  | 
Enterprises often fail to protect loss of data via printers, smartphones
Hacker Gets Three Years For Hijacking Schwab Brokerage Accounts
Quick Hits  |  4/9/2010  | 
Russian laundered more than $246,000, sending a portion back to Russia
Cisco WLAN Flaws May Be Typical Of Many Proprietary Systems, Researcher Says
News  |  4/9/2010  | 
Black Hat Europe presentation to offer view into Cisco WLAN vulnerabilities -- and a warning to users of other proprietary products
Enterprises Slow To Adopt Cloud Strategies, Risk Management
Quick Hits  |  4/8/2010  | 
ISACA study shows practical security issues stand in the way of next-gen technologies
Researchers Uncover 'Shadow Network'
Quick Hits  |  4/7/2010  | 
Espionage network has been stealing information from Indian government -- and even the Dalai Lama, report says
Customers Sue Countrywide Financial Over Theft And Sale Of Personal Data
News  |  4/7/2010  | 
Class-action suit seeks $20 million as well as answers about company's involvement
Many U.S. Government Agencies Have Been Attacked, Survey Says
Quick Hits  |  4/6/2010  | 
Three-quarters of federal IT decision-makers say likelihood of a foreign attack is 'high'
Researcher Details New Class Of Cross-Site Scripting Attack
News  |  4/6/2010  | 
'Meta-Information XSS' exploits commonly used network administration utilities
Companies Fall Short On Protecting Sensitive Data, Study Says
Quick Hits  |  4/5/2010  | 
Compliance-driven programs detract from efforts to secure real intellectual property, Forrester Research finds
N.J. Supreme Court Rules Employers Can't Always Read Personal Email
News  |  4/5/2010  | 
Employees who use password-protected, third-party services can have a reasonable expectation of privacy, court says


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-46346
PUBLISHED: 2022-01-20
There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.
CVE-2021-46347
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
CVE-2021-46348
PUBLISHED: 2022-01-20
There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0.
CVE-2021-46349
PUBLISHED: 2022-01-20
There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
CVE-2021-46350
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.