Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

DarkReadingTim
Member Since: March 12, 2014
Strategist
Blog Posts: 1718
Posts: 238

posted in May 2007

22 items
Guerrilla Storage
News  |  5/31/2007  | 
Hackers could use your computers to house their data, Symantec researchers say
How to Stop Political Attacks
News  |  5/30/2007  | 
Experts advise users on how to defend themselves against cyber-terrorism, cyber wars, and hacktivism
New Laws Don't Solve Global Problems
News  |  5/29/2007  | 
US, Germany advance legislation against spyware, spam - but can't do much to stop foreign exploits
Fed Workers Still in the Dark
News  |  5/27/2007  | 
Despite completing awareness courses, majority of government workers say they've never heard of key guidelines
Users' Most Hated Sales Pitches
News  |  5/25/2007  | 
What ticks you off about security vendors' sales pitches? Exasperated customers offer their un-favorites
New Spec Could Cut Phishing, Spam
News  |  5/23/2007  | 
IETF approves email signature standard pioneered by Yahoo!, Cisco
Vendors Get Their NAC Together
News  |  5/22/2007  | 
Interoperability pact between Microsoft, TCG breaks down endpoint security barriers
New Rules May Ease SOX Audits
News  |  5/21/2007  | 
Proposed guidelines could lower SOX costs, lessen auditors' influence
Many Governments Censor Internet Content
News  |  5/18/2007  | 
Filtering prevents many citizens from seeing what officials don't want them to see, study finds
Spammers Stymie UK Email
News  |  5/17/2007  | 
British ISP forced to shut down Web mail service due to 'unpatchable' vulnerability
Flaws Found in Airline Screening Process
News  |  5/16/2007  | 
Blinding insights to the glaringly obvious: GAO says passenger screening inefficient, may violate privacy rights
IBM, Symantec Tackle Compliance
News  |  5/15/2007  | 
New tools and strategies promise to cut costs, speed projects; now they have to deliver
Verizon Grabs Cybertrust
News  |  5/14/2007  | 
Merger sets stage for clash of telecom titans
Profit-Minded Trojans
News  |  5/11/2007  | 
Majority of Trojan attacks now designed for financial gain, researchers say
California Hammers on E-Voting
News  |  5/10/2007  | 
Comprehensive audit and penetration test designed to end voters' fears about electronic voting
Mizzou's Help Desk Hack
News  |  5/9/2007  | 
Attacker accesses more than 22,000 student records by cracking university's computer trouble-reporting system
TSA Loses 100,000 Employee Records
News  |  5/8/2007  | 
Airport security organization loses hard drive containing personal information on workers
Symantec Readies New Client Tools
News  |  5/7/2007  | 
CTO, research VP offer glimpse at company's product drawing board
Security's Top Five Priorities
News  |  5/4/2007  | 
Portable devices, Web application security are among the issues keeping CSOs awake these days
SEC: WFI Insider Stole $7.7M
News  |  5/3/2007  | 
Stock options manager accused of abusing access rights to embezzle 700,000 shares from wireless security firm
DRM Hack Flap Sparks Digg 'Riot'
News  |  5/2/2007  | 
Effort to take down hack postings results in crippling rebellion at social networking site
Security's Biggest Train Wrecks
News  |  5/1/2007  | 
Think you've made security mistakes? These 10 prize-winners (we had to limit it) took the cake in Dark Reading's first year


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-26773
PUBLISHED: 2022-05-26
A logic issue was addressed with improved state management. This issue is fixed in iTunes 12.12.4 for Windows. An application may be able to delete files for which it does not have permission.
CVE-2022-26774
PUBLISHED: 2022-05-26
A logic issue was addressed with improved state management. This issue is fixed in iTunes 12.12.4 for Windows. A local attacker may be able to elevate their privileges.
CVE-2022-26775
PUBLISHED: 2022-05-26
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4. An attacker may be able to cause unexpected application termination or arbitrary code execution.
CVE-2022-26776
PUBLISHED: 2022-05-26
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. An attacker may be able to cause unexpected application termination or arbitrary code execution.
CVE-2022-29632
PUBLISHED: 2022-05-26
An arbitrary file upload vulnerability in the component /course/api/upload/pic of Roncoo Education v9.0.0 allows attackers to execute arbitrary code via a crafted file.