Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

DarkReadingTim
Member Since: March 12, 2014
Strategist
Blog Posts: 1718
Posts: 238

posted in June 2009

24 items
Study: Social Network Users Put Their Data At Risk
Quick Hits  |  6/27/2009  | 
Users of Facebook, LinkedIn, Twitter leave themselves -- and their wallets -- open to attack
Booming Underground Economy Makes Spam A Hot Commodity, Expert Says
News  |  6/25/2009  | 
$10 might be enough to reach 1 million users, MessageLabs researcher warns
FTC Issues Final Order In CVS Caremark Data Security Case
News  |  6/24/2009  | 
Pharmacy giant to pay penalties for mishandling customer data, violating HIPAA regulations
Study: Security Concerns Keep Users From Taking Full Advantage Of Mobile Devices
Quick Hits  |  6/24/2009  | 
Sixty-five percent of customers worry that their devices may not be safe, particularly for financial transactions
Security Poised To Grab Bigger Piece Of IT Pie, Gartner Says
News  |  6/23/2009  | 
Analyst firm offers view of security market as it prepares for summit next week
CISOs Say Insiders Are Greatest Threat To Data
Quick Hits  |  6/23/2009  | 
In study, 80 percent say they're more concerned about employees and contractors
Parking Meters: The Next Big Hack?
Quick Hits  |  6/22/2009  | 
Security researcher prepares to outline vulnerabilities at upcoming Black Hat conference
MasterCard Imposes Tougher PCI Auditing Requirements On Midlevel Merchants
Quick Hits  |  6/19/2009  | 
Level 2 merchants will now be required to undergo a third-party, on-site audit, MasterCard says
Oracle Users Struggle With Patch Management
News  |  6/18/2009  | 
Despite new tools that speed deployment, many administrators are still far behind
New Injection Attack Compromises More Than 40,000 Websites
News  |  6/17/2009  | 
'Nineball' exploit is distinct from Gumblar, Beladen, researchers say
ITRC Report: Malicious Attacks Increased In First Half Of 2009
Quick Hits  |  6/17/2009  | 
Insider attacks, external breaches make up a higher percentage of compromises
Dark Reading Launches Database Security Tech Center
Commentary  |  6/16/2009  | 
Today Dark Reading launches a new feature: the Database Security Tech Center, a subsite of Dark Reading devoted to bringing you news, product information, opinion, and analysis specifically focused on the topic of database security.
Former Employee Sues Aetna Over May Data Breach
Quick Hits  |  6/12/2009  | 
Class action suit alleges negligence in Website hack
Working With Security Service Providers: What Every Small Business Manager Should Know
News  |  6/12/2009  | 
Choosing the right provider is only the beginning, experts say. The real key is building a relationship
Flaw In Virtualization App Causes Data Loss On Thousands Of Websites
Quick Hits  |  6/10/2009  | 
VAServ says some customers may never recover data wiped in zero-day attack
Researcher: Popular Internal IP Addressing Scheme Could Leave Enterprises Vulnerable
News  |  6/9/2009  | 
Flaws in RFC 1918 could be exploited to gain access to enterprise networks, says Robert "RSnake" Hansen
New Wiki Promises Breach Training For Business Execs
Quick Hits  |  6/8/2009  | 
BreachCenter.com hopes to play host to discussions on breach prevention, response
EFF Web Service Tracks Changes In Privacy Policies At Popular Websites
Quick Hits  |  6/5/2009  | 
Electronic Frontier Foundation's TOSBack.org will shed light on changes in service and privacy policies on such sites as Facebook, Google, and eBay
Hackers Arrested In China After Feud Causes Major Outage
News  |  6/4/2009  | 
DDoS feud between underground gaming services allegedly caused temporary Internet outage across more than 20 provinces
For SMBs, Being Security-Savvy Doesn't Always Mean Doing It Yourself
Commentary  |  6/4/2009  | 
When it comes to security, most security professionals -- indeed, most Dark Reading readers -- are do-it-yourselfers. They do their own research, find their own bugs, and remediate their own systems. It's almost a rite of passage -- if you have to ask for help, you can't be a real security pro. But I wonder, sometimes, if this attitude doesn't hurt small and midsize businesses, in which having even one full-time security professional is more than many can afford. Such businesses are ju
More Than 530,000 Patients Notified In Data Ransom Scare
Quick Hits  |  6/3/2009  | 
"Kidnapper" who held data for ransom still at large, Virginia authorities say
Study: Web Trackers Systematically Compromise Users' Privacy
News  |  6/3/2009  | 
Website monitoring practices take advantage of many loopholes in privacy regulations, UC-Berkeley study says
Despite Breaches, Universities Feel Good About Security Progress
Quick Hits  |  6/2/2009  | 
Almost half of universities report breaches, but most say damage was limited
Report: Mass Injection Attack Affects 40,000 Websites
Quick Hits  |  6/1/2009  | 
Exploit appears similar, but unrelated, to Gumblar, researchers say


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29785
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
CVE-2021-46061
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
CVE-2021-44090
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
CVE-2021-44092
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
CVE-2021-44244
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.