Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in May 2009

20 items
Report Identifies The Most Dangerous -- And Safest -- Search Terms
Quick Hits  |  5/29/2009  | 
"Viagra" is surprisingly safe, but "screensaver" is a dangerous search, McAfee report says
Security Alliances Partner To Work On Cloud Computing
Quick Hits  |  5/27/2009  | 
Jericho Forum, Cloud Security Alliance agree to align their best practices for secure collaboration in the cloud
Security Experts Raise Alarm Over Insider Threats
News  |  5/26/2009  | 
Economic troubles raising the stakes on potential threats, FIRST members say
Facebook Falls Victim To Another Phishing Attack
Quick Hits  |  5/22/2009  | 
Phishers use cryptic message to lure users into giving up their account information
Study: 'Secret Security Questions' Can Be Guessed By Insiders
Quick Hits  |  5/21/2009  | 
Ability to guess the answers to second-level security questions goes up significantly if the guesser knows the account holder, study says
Web 2.0 Conquers The Workplace, But Many Security Departments Aren't Ready
Quick Hits  |  5/20/2009  | 
Many enterprises are lacking key tools for protecting Web 2.0 data, study says
Enterprises Still Struggling To Get Results From SIEM, Log Management
Quick Hits  |  5/19/2009  | 
Most survey respondents still haven't achieved quantifiable benefits, study says
Report: Growth Of Digital Data Could Overwhelm Security
Quick Hits  |  5/18/2009  | 
IDC "Digital Universe" study says volume of data is vastly outgrowing the resources available to protect it
McAfee Acquires App Whitelisting Vendor Solidcore For $33M
Quick Hits  |  5/15/2009  | 
Buyout will set the stage for end-to-end compliance offering, security giant says
Rapidly Spreading 'Gumblar' Attack Redirects Users' Web Searches
News  |  5/14/2009  | 
Malware scripts morph from site to site, and even from page to page, within the same site, ScanSafe researchers say
Insider May Have Breached More Than 10,000 Patient Records At Johns Hopkins
News  |  5/13/2009  | 
Employee had access to patient database as part of her job, report says
Many IT Risk Management Projects Go Unfunded
Quick Hits  |  5/13/2009  | 
Seventeen percent of companies say it's only a matter of time before an internal breach occurs
Report: Zeus Flips Kill Switch On More Than 100,000 PCs
Quick Hits  |  5/11/2009  | 
Botnet reportedly triggered a little-used capability called "Kill OS," rendering a blue screen on 100,000-plus PCs and making them difficult to reboot
Researchers Find Missile Defense Data On Used Hard Drive
News  |  5/8/2009  | 
Study also produces sensitive data from Ford Motor, Laura Ashley, and other businesses
Feds Indict Alleged Cisco, NASA Hacker
Quick Hits  |  5/7/2009  | 
Swedish man known as "Stakkato" accused of stealing Cisco IOS code
Web 2.0 Environs Are Now Hackers' Favorite Target
Quick Hits  |  5/6/2009  | 
Next-gen collaborative sites now account for 21 percent of all Web hacks, report says
Former Security Chiefs Advise Caution In Reorganizing Cybersecurity Effort
News  |  5/5/2009  | 
Powell, Garcia, and Schmidt say wholesale reorganization may not be necessary
Heartland Payment Systems' PCI Compliance Is Reinstated
Quick Hits  |  5/4/2009  | 
Visa gives payment services provider the green light following 2008 megabreach
Security's Past Gives Hints To Its Future
Commentary  |  5/4/2009  | 
Julius Caesar didn't see the need for a bodyguard when he went to the floor of the Roman senate on a March day in 44 B.C. That little oversight cost him 23 stab wounds and the throne of the empire. More than 1,900 years later, Abe Lincoln entered the presidential box at Ford's Theater in Washington, D.C. -- again, no bodyguard seemed necessary. We all know how that decision turned out.
At Last Minute, FTC Postpones Enforcement Of Red Flags Rule
Quick Hits  |  5/1/2009  | 
Enterprises given till Aug. 1 to comply with rules for securing personal data

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.