Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

DarkReadingTim
Member Since: March 12, 2014
Strategist
Blog Posts: 1718
Posts: 238

posted in August 2010

12 items
Delaware Contractor Mistakenly Posts Personal Data Of 22,000 Employees
News  |  8/31/2010  | 
Data sent along with RFP was not randomized to hide sensitive information, officials say
China, Taiwan Nab 450 Suspects In Biggest Fraud Raid Ever
News  |  8/30/2010  | 
Cash, fraud "manuals" seized in alleged telecom fraud ring
Enterprise Data Continues To Leak, Study Says
Quick Hits  |  8/30/2010  | 
More than one third of companies have experienced the loss of sensitive data in the last year
More Than 20 Million Americans Have More Than One SSN On Record, Study Says
Quick Hits  |  8/13/2010  | 
Data entry errors, falsifications suggest that SSNs might not be effective as unique identifiers
Americans Becoming More Concerned About Security, Study Says
Quick Hits  |  8/11/2010  | 
Loss of personal and financial information is as much of a concern as loss of job, NCSA/APWG survey says
Former IT Admin Gets Four Years For Locking City Of San Francisco Out Of Its Network
Quick Hits  |  8/9/2010  | 
Attorney says Terry Childs will appeal guilty verdict
Dark Reading Launches New Tech Center On Authentication
Commentary  |  8/8/2010  | 
Today Dark Reading launches a new feature: the Authentication Tech Center, a subsite of Dark Reading devoted to bringing you news, insight, and in-depth reporting on the topic of authentication and certification of end user access.
Attitudes About PC And Mobile Device Security Converging, Study Says
Quick Hits  |  8/6/2010  | 
Report by Forrester indicates that smartphone administrators want encryption, malware protection
Holy Zeus! Popular Botnet Rules As New Exploits Come Online
News  |  8/4/2010  | 
Trusteer, AVG identify new botnets with different features, both built on Zeus technology
ID Fraudsters Tapping Children's Social Security Numbers, Report Says
Quick Hits  |  8/4/2010  | 
New scam often goes undetected until minors' credit ratings are wrecked, report says
Building Botnets For Fun And Profit
News  |  8/3/2010  | 
Creating a botnet business can be lucrative -- and isn't as hard as you might think, Black Hat speaker says
Design Flaws Make All Browsers Vulnerable, Black Hat Speaker Says
Quick Hits  |  8/2/2010  | 
In series of hacks, researcher demonstrates inherent flaws in currently-used browsers


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29785
PUBLISHED: 2022-01-20
IBM Security SOAR V42 and V43could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 203169...
CVE-2021-46061
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
CVE-2021-44090
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter.
CVE-2021-44092
PUBLISHED: 2022-01-20
An SQL Injection vulnerability exists in code-projects Pharmacy Management 1.0 via the username parameter in the administer login form.
CVE-2021-44244
PUBLISHED: 2022-01-20
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel's Management System 1.0 via the username parameter in login.php.