Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

DarkReadingTim
Member Since: March 12, 2014
Strategist
Blog Posts: 1718
Posts: 238

posted in August 2006

25 items
New Browser Hides User Behavior
News  |  8/31/2006  | 
Browzar flushes cache, history, and cookies as soon as the user closes the application
Wireless Piggybackers Put on Notice
News  |  8/30/2006  | 
New California law encourages users to lock up WLANs, setting the stage for criminal action against hackers and piggybackers
Cisco Reports New Vulnerabilities
News  |  8/25/2006  | 
Firewalls, VPN 3000 Concentrator are at risk and in need of a fix, networking giant says
IBM Merger Gets Mixed Responses
News  |  8/24/2006  | 
Raise prices? Win more outsourced security? IBM-ISS deal leaves many wondering what Big Blue will do with its new prize
IBM Up-Ends Security Services Market
News  |  8/23/2006  | 
IBM's $1.3 billion buyout of ISS may signal large enterprises are more willing to embrace managed security services
Standard Could Unify Security Apps
News  |  8/22/2006  | 
ArcSight's proposed standards for log management, event reporting could get security apps onto the same page
Click Fraud: What IT Should Know
News  |  8/22/2006  | 
As fraud grows, more marketing execs are asking IT to ascertain who's really clicking online ads
Startup Promises Critical-Site Analysis
News  |  8/21/2006  | 
New consulting firm will help 'national security-critical' sites evaluate physical and logical security
Flaws Reported in Bank of America System
News  |  8/18/2006  | 
Sestus, rival to vendor of Bank of America's SiteKey authentication system, reports vulnerabilities in the Sitekey technology
'Analog Hackers' Overlooked, Undetected
News  |  8/17/2006  | 
Many enterprises secure electronic access points but fail to see their own front doors as vulnerable
How Much Does a Hack Cost?
News  |  8/16/2006  | 
We're thinking of a number between $100,000 and $50 million; here's how to handicap your cost per incident a little more closely
Complaint Filed in AOL Blunder
News  |  8/16/2006  | 
Electronic Frontier Foundation files complaint with the FTC over the online service's exposure of customer search information
Startup to Challenge Botnets
News  |  8/15/2006  | 
A stealth-mode company is working on a way to detect and interrupt the formation of botnets
Bridging the Patch Gap
News  |  8/14/2006  | 
With patch times stretching to a week or more, enterprises struggle to put bars on an ever smaller window of attack
Exploits Emerge for Microsoft Vulnerability
News  |  8/14/2006  | 
MS06-040, expected to be precursor to a major worm, may instead morph into a botnet
Search Engine Goes On Offensive
News  |  8/11/2006  | 
Malware search engine Offensive Computing helps security pros find, analyze, and download hostile files
Second-Hand Drives Yield First-Class Data
News  |  8/11/2006  | 
Study shows companies, users still vulnerable to data theft via unerased, recycled hard drives
Researchers Break Into Bank
News  |  8/10/2006  | 
Cardiff University researchers have discovered how to access online accounts of HSBC banking customers
The Portable Puzzle
News  |  8/10/2006  | 
Solutions for managing security of mobile systems and portable storage devices still elude many enterprises
IT's Roving Eyes
News  |  8/9/2006  | 
From snooping to sabotage, your IT department might be your enterprise's greatest unchecked security threat
Users Outraged by AOL Gaffe
News  |  8/8/2006  | 
Users advocate boycott, following blunder that exposes search logs of 650,000 AOL customers
Senate OKs Controversial Internet Treaty
News  |  8/7/2006  | 
The international Convention on Cybercrime is 'world's worst Internet law,' critics say
Laptop Theft Hits Toyota
News  |  8/4/2006  | 
A stolen laptop may contain the names and Social Security info of 1,500 employees at San Antonio truck plant, auto dealer says
Web Service Hides Behavior
News  |  8/4/2006  | 
Technology developed by dating service lets users mask their identities and activities on the Web
No Wires & No Policies
News  |  8/2/2006  | 
Despite the convenience of wireless and portable devices, most security policies still don't embrace them, according to a new Dark Reading survey


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29785
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
CVE-2021-46061
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
CVE-2021-44090
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
CVE-2021-44092
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
CVE-2021-44244
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.