Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in August 2009

17 items
Zeus Trojan Uses IM Speed Distribution Of Stolen Data
Quick Hits  |  8/31/2009  | 
Jabber IM module built into Trojan sends compromised data quickly to mobile criminals
Trojan Could Enable Attackers To Eavesdrop On Skype Calls
Quick Hits  |  8/28/2009  | 
Exploit saves conversations as MP3 files to make detection more difficult, researchers say
Cybercriminals: Taking The Road Less Traveled
Commentary  |  8/27/2009  | 
If you were a criminal, what data would you be looking for? The most obvious answer is to look for the types of data that give you direct access to cash: bank accounts, brokerage accounts, credit cards. Like Willie Sutton, you'd go where the money is, right? And that's why some of the stiffest security defenses surround this sort of account data.
New Malicious Web Links Up More Than 500 Percent In First Half 2009
Quick Hits  |  8/26/2009  | 
Vulnerabilities level off, phishing is down, IBM XForce report says
IDC Report: Most Insider Leaks Happen By Accident
News  |  8/25/2009  | 
Unintentional leaks may cause more damage than internal fraud, research study says
Newly Discovered Vulnerability Could Threaten Cisco Wireless LANs
News  |  8/24/2009  | 
Flaw in Cisco Over-The-Air-Provisioning could allow attackers to gain control of wireless access points, AirMagnet researchers say
Project Honey Pot Files Lawsuit Against Spammers
Quick Hits  |  8/24/2009  | 
Group hopes to collect information that will lead to identification of unknown bank scammers
Employers Crack Down On Social Networking, Web Surfing At Work
Quick Hits  |  8/21/2009  | 
More than three-quarters of organizations now block social net sites, ScanSafe says
Eight Indicted For $22M Identity Theft Scam Against AT&T, T-Mobile
News  |  8/20/2009  | 
Defendants allegedly hijacked customers' identities to steal millions of dollars in wireless gear
Startup Launches Free, Collaborative Antivirus Package
News  |  8/19/2009  | 
Immunet offers cloud-based solution that innoculates an entire community when one member is infected
Are Software Houses Infecting Their Customers?
Quick Hits  |  8/19/2009  | 
New virus infects source code written in popular Delphi language, Sophos says
FTC Finalizes Rules On Health Care Breach Disclosure
News  |  8/18/2009  | 
Organizations will be required to notify patients of breaches, even if they are not bound by HIPAA
Study of Russia-Georgia Cyber Conflict Brings Warnings To U.S. Businesses, Citizens
News  |  8/18/2009  | 
Companies, end users could easily be swept up in politically-motivated attacks, researchers say
Alleged TJX Hacker Indicted For Heartland, Hannaford Hacks
Quick Hits  |  8/17/2009  | 
Albert "Segvec" Gonzalez may have played role in many other data thefts as well, prosecutors say
Ukrainian Attackers Use SEO, Fed Forms To Push Scareware To U.S. Users
Quick Hits  |  8/7/2009  | 
Hackers "hijack" keywords to U.S. federal forms, placing malware at top of search results
Nine U.K. Workers Fired For Tapping Into National Identity Database
Quick Hits  |  8/5/2009  | 
Thirty-four U.K. government employees accessed Customer Information System for personal reasons, report says
At Black Hat, Cloud Of Doubt Hovers Over Government Initiatives
News  |  8/3/2009  | 
Security industry should not be waiting around for government to lead, speakers say

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.