Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in June 2008

22 items
Startup Promises to Slow Software Tampering
News  |  6/25/2008  | 
Metaforic says its anti-hacking tools aren't invulnerable, but definitely will make software exploits less fun
Filling Out Forms: Still a Dangerous Game
News  |  6/20/2008  | 
Despite upgrades and fixes, most browsers are still vulnerable to attacks via Web forms, researcher says
New Worm Spawns More Than 8M Spam Messages
Quick Hits  |  6/20/2008  | 
Fake news come-ons lead to infected porn site
ID Protection Startup Prepares Commercial Push
News  |  6/19/2008  | 
After completing identity theft study and numerous breach response engagements, Debix says it's good to go
GAO: There Ought to Be a Law
Quick Hits  |  6/18/2008  | 
Government's ability to extract and manipulate personal data is too broad, watchdog agency says
Encryption: DLP's Newest Ingredient
News  |  6/17/2008  | 
Major vendors increasingly add encryption offerings to their data loss prevention packages
High-Profile Hackers Get Their Days in Court
News  |  6/16/2008  | 
And in two cases, that day is followed by a whole bunch of days in the hoosegow
Study: IT Security Isn't as Good as It Thinks
Quick Hits  |  6/16/2008  | 
Many IT and security groups overlook key vulnerabilities, CDW study says
TD Ameritrade Settlement Hits Snag
Quick Hits  |  6/13/2008  | 
Court delays decision on class action case after plaintiff goes maverick
Email Surveillance Switch Pays Off at Brokerage
News  |  6/13/2008  | 
Frustrated by high rate of false positives, Scott and Stringfellow moves to Orchestria
IT Execs: Our Breaches Are None of Your Business
Quick Hits  |  6/12/2008  | 
More than 60% don't even want to tell the cops, much less the public
Verizon Study Links External Hacks to Internal Mistakes
News  |  6/12/2008  | 
Most breaches come from outside the company, but they are often triggered by unfound errors on the inside
Cybercrime Outranks Other Crimes on Europeans' Worry List
Quick Hits  |  6/11/2008  | 
Almost half of German PC users believe they will eventually fall victim
Researchers Link Storm Botnet to Illegal Pharmaceutical Sales
News  |  6/11/2008  | 
Prescription drug spammers are bankrolling botnet's growth, IronPort study says
American Airlines Warns of Phishing Scheme
Quick Hits  |  6/10/2008  | 
If you get a message from the airline promising $50 to answer a survey, don't answer it
Major Security Vendors' Sites Could Be Launchpads for Phishing Attacks
News  |  6/10/2008  | 
McAfee, Symantec, and VeriSign sites all found to contain cross-site scripting flaws
Mind-Reading: The Next Great Privacy Debate?
Quick Hits  |  6/9/2008  | 
New MRI technology lets doctors see images in your mind - now there's a scary thought
New Virus Lets Attackers Hold Data for Ransom
Quick Hits  |  6/6/2008  | 
Gpcode variant encrypts many file types with strong key; attackers ask for a bounty to decrypt
Adware Pops to Top of May Threat List
Quick Hits  |  6/4/2008  | 
Trojan.Clicker.CM lets attackers bypass Norton popup blocker
Army Hospital Breach May Be Result of P2P Leak
News  |  6/3/2008  | 
Data loss at Walter Reed exposed personal information on 1,000 soldiers
At Gartner Summit, Experts Question Security's Future
News  |  6/2/2008  | 
Analysts, sci-fi authors challenge security pros to rethink the status quo
Look Beyond Executable Files, Botnet Researchers Warn
Quick Hits  |  6/2/2008  | 
More and more botnets are recruiting zombies via everyday documents, researchers say

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.