Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in July 2008

26 items
Startup Promises More Accurate Fraud Detection
News  |  7/31/2008  | 
Guardian Analytics's new 'fraud modeling' technology recognizes activity that goes outside user norm
New Video Surveillance Technology 'Recognizes' Abnormal Activity
News  |  7/28/2008  | 
BRS software can establish 'normal' on-camera activity - and alert security staff when something unusual occurs
Small & Mid-Sized Enterprises Living in La-La Land, Study Says
Quick Hits  |  7/25/2008  | 
Many smaller firms kid themselves that they're too little to be targets, McAfee study says
Report: Website Infection Rate Has Tripled Since 2007
Quick Hits  |  7/24/2008  | 
Malicious Web pages now exceed more than 16,000 per day, Sophos says
Details, Exploits of Web-Wide DNS Vulnerability Revealed
News  |  7/24/2008  | 
Kaminsky outlines flaw, says 'we're in serious trouble'; exploit code posted on Metasploit
Researchers Raise Alarm Over New Iteration of Coreflood Botnet
News  |  7/23/2008  | 
Password-stealing Trojan is spreading like a worm - and targeted directly at the enterprise
Web-Wide DNS Vulnerability Leaked
Quick Hits  |  7/23/2008  | 
'Accidental' posting by researchers briefed on the flaw may lead to exploits today
Kaminsky to Give More Info on Super-Secret DNS Flaw
Quick Hits  |  7/22/2008  | 
Webinar on Thursday sets stage for comment on Halvar Flake's 'guess' on Web-wide vulnerability
Report: Vulnerabilities Abound in Open-Source Environments
News  |  7/21/2008  | 
Enterprises should take care in adopting open-source technology, Fortify study says
President of Georgia's Site Under Attack
Quick Hits  |  7/21/2008  | 
Former Soviet republic could follow Estonia and Lithuania as the next target of Russian cyber attacks
Researcher Offers Malware Analysis Tool
News  |  7/18/2008  | 
Proof-of-concept tool is more difficult for hackers to detect and evade than current malware analyzers
SF Net Hijacker Gives Up Passwords
Quick Hits  |  7/18/2008  | 
Former IT administrator says he's ready to give the keys back to the city
Report: Outsider Attacks Down, Insider Attacks Up
Quick Hits  |  7/16/2008  | 
Annual CA security report indicates fundamental shift in the nature of enterprise threats
Vulnerabilities Could Expose Broad Range of Java Apps
News  |  7/16/2008  | 
Newly discovered flaws in open-source framework could allow attackers to alter data or hijack Web applications
Europe Grants First Privacy Certification
News  |  7/14/2008  | 
EuroPriSe seal tells Web surfers that sites won't break rules regarding the use and storage of personal data or online behavior
UK Local Governments Selling Voters' Personal Data
Quick Hits  |  7/14/2008  | 
Little-known legal provision allows local governments to sell voter names and and addresses for as little as $10 per 1,000
National 'Do Not Call' Registry Is Working, FTC Says
News  |  7/10/2008  | 
Commission pats itself on the back, but marketers and consumers are still holding the phone
New App Lets IT Find Porn on Users' PCs
Quick Hits  |  7/10/2008  | 
Thumb drive detector could also be used by police, parents
Congress Opens Debate on Behavioral Advertising
News  |  7/9/2008  | 
Businesses say tracking users' online behavior is a benefit; privacy advocates say it's a threat
P2P Hack Exposes Info on Top Judge
Quick Hits  |  7/9/2008  | 
Supreme Court justice is among 2,000 investment firm clients whose personal data was exposed via Limewire
Vendors Issue Massive Simultaneous Patch for Common Internet Flaw
News  |  7/8/2008  | 
Design flaw in DNS protocols could have been used to redirect traffic across the Internet
Russians Organizing 'Political Hack Force'
Quick Hits  |  7/7/2008  | 
Lithuanian attacks could be signal of actions to come
Privacy-Conscious Consumers Fight Back
Quick Hits  |  7/3/2008  | 
Many consumers are now resisting companies' requests for personal information, Canadian study says
Laptop Losses Total 12,000 Per Week at US Airports
News  |  7/2/2008  | 
Nearly 70% are never recovered; many go unreported
Citibank PIN Hack: Deja Vu
Quick Hits  |  7/2/2008  | 
Hack keeps coming back to haunt banking giant
PCI Standards Expanded to Include Unattended Devices
News  |  7/1/2008  | 
New specs respond to emerging threats posed at kiosks, ATM devices

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.