Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in August 2011

18 items
Researchers Uncover The Email That Led To The RSA Hack
Quick Hits  |  8/26/2011  | 
F-Secure labs analyst isolates the original exploit that led to the breach of SecureID
Google Gives Up $500M In Revenue From Canadian Online Pharmacies
Quick Hits  |  8/24/2011  | 
Search engine giant should not have sold ads to unauthorized pharmacies, Department of Justice says
How Security Breaches Happen -- And What You Can Do About It
Quick Hits  |  8/22/2011  | 
Join Dark Reading/InformationWeek virtual event Thursday for firsthand insight on security breaches
GingerMaster Is First Malware To Utilize A Root Exploit On Android 2.3
Quick Hits  |  8/21/2011  | 
New attack can successfully avoid detection by antivirus programs, university research team says
Prospective 'Dog Wars' Players Get Malware Message From Animal Rights Activists
Quick Hits  |  8/17/2011  | 
Fake version of dog-bites-dog game contains a Trojan bearing animal rights messages
Botnets And Google Dorks: A New Recipe For Hacking
News  |  8/16/2011  | 
Attackers finding new ways to automate the hunt for vulnerabilities, Imperva researchers say
Product Watch: AirPatrol Launches New Way To Enforce Mobile Device Security
News  |  8/16/2011  | 
'Situationally aware' technology can turn mobile apps on and off depending on where the device goes -- and who's nearby
Source Code For SpyEye Trojan Published; More Exploits On The Horizon, Researcher Says
News  |  8/15/2011  | 
Once costly code for data-stealing Trojan is now available to the masses, Damballa reports
SIEM Users Seek To Drill Deeper Into Security Data, Study Says
Quick Hits  |  8/15/2011  | 
Security monitoring, data warehousing, and business intelligence are on integration path, according to Forrester Research
Dark Reading Launches New Tech Center On Security And Compliance
Commentary  |  8/15/2011  | 
New Compliance Tech Center will cover relationship between security initiatives and compliance initiatives
Researchers Claim Flaws In Facebook; Facebook Calls Them 'Best Practices'
Quick Hits  |  8/12/2011  | 
Short passwords, non-SSL-encrypted forms are criticized by Cenzic
AntiSec's Dump Of Law Enforcement Data Includes Personal Data Of Thousands
News  |  8/10/2011  | 
Published info contains more than 2,500 SSNs, 15,000 dates of birth, 8,000 passwords, and 45,000 personal addresses, study says
Study: Mobile Security Software Market To Grow Sixfold In Next Five Years
Quick Hits  |  8/10/2011  | 
Revenues from mobile security software will hit $3.7 billion by 2016, Juniper Research says
'Willysy' osCommerce Injection Attack Affects More Than 8 Million Pages
Quick Hits  |  8/9/2011  | 
Malware exploits vulnerability in popular online merchant platform, Armorize says
At Black Hat, Mobile Devices Under The Microscope
News  |  8/5/2011  | 
Security researchers find growing numbers of security vulnerabilities in smartphones
Likelihood Of Android Infection Has More Than Doubled In Six Months
Quick Hits  |  8/4/2011  | 
Thirty percent of mobile users are likely to click on an unsafe link, Lookout study says
Study: Cybercrime Becoming More Costly, More Frequent For Enterprises
News  |  8/2/2011  | 
In survey of 50 companies, Ponemon finds average annual cost of cybercrime is $5.9 million
Over Half Of SAP Servers On The Internet Are Vulnerable To Attack, Researcher Says
Quick Hits  |  8/1/2011  | 
Critical flaws in leading ERP app to be demonstrated at Black Hat this week

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.