Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in July 2007

20 items
File Formats: A Moving Target
News  |  7/31/2007  | 
Which types of files are most in danger of attack? Experts - and attackers - frequently change their minds
Researcher Barred From US
News  |  7/30/2007  | 
Renowned security expert Halvar Flake denied travel from Germany after his Black Hat presentation is found in search
Aflac Loses Data on 152,000
News  |  7/27/2007  | 
Company quacks 'fowl!' over theft of laptop in Japan
Third Parties Fumble Data Handoffs
News  |  7/26/2007  | 
Your company's data breach may result from a partner's mistakes
New Tool Automates Spam
News  |  7/25/2007  | 
Cheap software promises to post 1,100 messages to Web forums in less than 15 minutes
Help Wanted: ID Theft Victims
News  |  7/24/2007  | 
That online job recruiter may actually be a criminal trying to steal your personal data
Pointing to Danger
News  |  7/23/2007  | 
Researcher to show how dangling pointer flaws, long viewed as inconsequential, can be a path to serious infection
ID Management Gets Granular
News  |  7/20/2007  | 
New TNT software helps companies control access to critical data by user, device, and time of day
Spam Changes Direction
News  |  7/19/2007  | 
While PDF and image-based attacks skyrocket, spammers quietly shift toward Europe
Leaks Found in Louisiana University Systems
News  |  7/18/2007  | 
Student uncovers 150 documents containing personal information on 80,000 individuals
Hackers Tap Western Union
News  |  7/17/2007  | 
Breach of customer database threatens personal info of about 20,000 customers
Cross-Site, Cross-Service
News  |  7/16/2007  | 
New cross-site scripting worm could propagate across Webmail services, user address lists
FBI Busts Payment Service Founders
News  |  7/13/2007  | 
Former execs at NETeller plead guilty to handling illegal online gambling transactions; shares suspended, chairman steps down
Online Gaming's Seamy Underside
News  |  7/12/2007  | 
New book reveals the black market for hacks and cheats, popular methods for cracking online games, and a warning for IT and security pros
Startup Launches Free Malware Blocker
News  |  7/11/2007  | 
Haute Secure comes out of stealth mode with freeware that can recognize and filter malware at the client
Japanese Bank Loses 1M Records
News  |  7/10/2007  | 
ATM transaction data for about 980,000 customers can't be found, Resona Bank says
Spyware Spreaders Settle Suit
News  |  7/6/2007  | 
FTC levies restrictions, $1.5 million fine on adware distributor
An Auction Site for Vulnerabilities
News  |  7/5/2007  | 
WabiSabiLabi takes buying and selling of security vulnerabilities mainstream with first above-board, eBay-like auction site
FlexiSPY: Product or Trojan?
News  |  7/3/2007  | 
Security vendors warn of new mobile spyware, but developer says its product is legit
Bucking Law Enforcement's Borders
News  |  7/2/2007  | 
New agreement could make it easier for cops to pursue privacy violators across geographic lines

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.