Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in July 2011

19 items
Study: Users Would Give Up Free Coffee To Get Better Mobile Device Access At Work
Quick Hits  |  7/30/2011  | 
Some users would even trade a vacation day -- but is consumerization safe for enterprises?
Police Arrest Alleged LulzSec Leader -- But Do They Have The Right Man?
Quick Hits  |  7/28/2011  | 
London police say they nabbed 'Topiary,' but others say they were duped
Product Watch: Norman Introduces 'Hybrid Sandboxing' Malware Analysis
News  |  7/26/2011  | 
Malware Analyzer G2 combines emulation, virtualization in one environment
Researchers Prepare Google Hacking Tools For Black Hat -- Hot Diggity!
News  |  7/20/2011  | 
Family of search tools will help security teams and pen testers find searchable flaws before bad guys, Stach & Liu researchers say
Google Tries Flagging Malware For Users
Quick Hits  |  7/20/2011  | 
Search engine will warn users if it detects a specific attack on their machines
Many Android Apps Are Leaking Private Information, Researcher Says
News  |  7/19/2011  | 
In study of 10,000 Android apps, Dasient finds more than 800 might be compromising data
More Windows Kernel Vulnerabilities May Yet Emerge, Researcher Says
News  |  7/19/2011  | 
After issuing dozens of patches this year, Microsoft could still have more work to do, Black Hat speaker warns
Authorities Arrest More Than 100 Suspects In Romanian Internet Fraud Ring
Quick Hits  |  7/18/2011  | 
Organized sales of fake merchandise might have involved 21 offenders in U.S., FBI says
Invitations To Join Google+ Could Be Ruse To Steal Facebook Info, Researchers Say
Quick Hits  |  7/14/2011  | 
Emerging social network is subject of data-stealing scam, Barracuda reports
Pentagon Reveals Theft Of 24,000 Files From Unnamed Contractor
Quick Hits  |  7/14/2011  | 
Large files were extracted by a foreign government in March, Deputy Defense Secretary says
Report: Sixty Percent Of Users Are Running Unpatched Versions Of Adobe
Quick Hits  |  7/13/2011  | 
Vulnerabilities in software could lead to breaches, Avast Software study warns
Anonymous Takes Aim At Monsanto, Oil Companies
Quick Hits  |  7/13/2011  | 
New round of attacks focuses on private industry
Anonymous Hacks Booz Allen, Taps 90,000 Military Emails
News  |  7/13/2011  | 
Hacker group claims defense contractor is developing software for manipulating social networks
Kiplinger Reveals Breach Of 142,000 Customer Accounts
Quick Hits  |  7/12/2011  | 
Database contained contact information, email addresses, and passwords, publisher says
New Research Names Top 10 Malware Delivery Networks
Quick Hits  |  7/9/2011  | 
Emerging category of networks is distinct from botnets, Blue Coat study says
Washington Post Data Breach Affects More Than 1 Million Job Seekers
News  |  7/7/2011  | 
User IDs, email addresses compromised in two separate attacks
'Sophisticated Cyberattack' Hits Pacific Northwest National Lab
News  |  7/6/2011  | 
Energy Department research facility's website down; employees still unable to access email
March Attack On South Korea Might Have Been A Test Run, Researchers Say
Quick Hits  |  7/6/2011  | 
Sophisticated attack was likely perpetrated by the same group who hit country in 2009, McAfee report says
Enterprises Should Patch For Vuln Criticality, Not App Popularity, Researchers Say
Quick Hits  |  7/1/2011  | 
Organizations could reduce risk significantly by changing patching priorities, according to Secunia

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.