Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

DarkReadingTim
Member Since: March 12, 2014
Strategist
Blog Posts: 1718
Posts: 238

posted in June 2010

20 items
Dark Reading Launches New Tech Center On Security For Small And Midsize Enterprises
Commentary  |  6/30/2010  | 
Today Dark Reading launches a new feature: the SMB Security Tech Center, a subsite of Dark Reading devoted to bringing you news, insight, and in-depth reporting on the topic of data security in small and midsize businesses.
FTC Slaps Twitter Down Hard For Lax Security, Privacy Violations
Quick Hits  |  6/25/2010  | 
Social networking site's claims will be scrutinized for 20 years; security program will be audited for 10 years
Kraken Botnet Making A Resurgence, Researcher Says
Quick Hits  |  6/24/2010  | 
Dismantled in 2009, once-powerful botnet is up to half its former size
How Much Should You Spend On Security? Gartner Offers Some Answers
Quick Hits  |  6/24/2010  | 
Security drops to No. 9 on the list of IT priorities, research firm says
Small And Midsize Businesses Getting Serious About Security, Study Says
News  |  6/21/2010  | 
Forty-two percent of SMBs have lost data; average cost per breach is more than $188,000
Data Breaches Will Increase This Year, Security And Compliance Officers Say
Quick Hits  |  6/21/2010  | 
Majority of respondents also said their personal data is less secure
Cracked Wi-Fi Standards (Finally) Being Phased Out
Quick Hits  |  6/18/2010  | 
Standards groups say WEP, TKIP will no longer be allowed in interoperability tests
More Than One-Third Of Internet Page Views Are Porn, Study Says
Quick Hits  |  6/16/2010  | 
Interactive gaming grew more than 200 percent in first quarter, Optenet reports
Why Can't Johnny Develop Secure Software?
News  |  6/16/2010  | 
Security experts agree that there's something wrong with the software development process, but there are differing opinions on how to solve the problem
Ipswitch Acquires MessageWay In Merger Of Managed File Transfer Vendors
News  |  6/14/2010  | 
Acquisition will pave the way for more secure application-to-application communications, partners say
New Paper Outlines Potential Vulnerabilities In Software Supply Chain
Quick Hits  |  6/14/2010  | 
Code integrity, authenticity are part of the development process, SAFECode argues
California Fines Five Hospitals For Failure To Protect Patient Data
Quick Hits  |  6/11/2010  | 
Unauthorized access leads to stiff penalties, showing teeth behind new state law
In Debate, Audience Finds That The Cyberwar Threat Is Not Exaggerated
News  |  6/10/2010  | 
Though hype abounds, the potential for damage from international cyberconflicts is real, experts say
Product Watch: Upstart Launches New Technology For Managing Smartphone Security
News  |  6/9/2010  | 
Mobile Active Defense system described as unified threat management for smartphones
Adobe Reports Zero-Day Vulnerability; No Fix Available Yet
Quick Hits  |  6/7/2010  | 
Flaw affects Adobe Flash Player, Reader, and Acrobat; exploits reported in the wild
Insurance Firm Says It Isn't Liable To Pay Claim In $3.3 Million University Of Utah Data Breach
News  |  6/7/2010  | 
Insurer of data storage firm says it isn't obligated to pay after burglars steal backup tapes from client employee's car
Digital River Sues Over Theft Of Data On Nearly 200,000 Customers
Quick Hits  |  6/4/2010  | 
New York man allegedly attempted to sell data that may have been stolen by hackers in India
FTC Reaches Settlement With Keylogger Maker
News  |  6/3/2010  | 
CyberSpy will be allowed to keep selling product, but not as a covert download
Facebook Users Subjected To 'Likejacking' Exploit
Quick Hits  |  6/2/2010  | 
iFrame hidden in 'liked' links is a new twist on clickjacking, researchers say
Small And Midsize Companies Take New Directions On SIEM
News  |  6/2/2010  | 
Security information and event management becoming less about compliance, more about forensics and incident response, studies say


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29785
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
CVE-2021-46061
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
CVE-2021-44090
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
CVE-2021-44092
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
CVE-2021-44244
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.