Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

DarkReadingTim
Member Since: March 12, 2014
Strategist
Blog Posts: 1718
Posts: 238

posted in September 2006

19 items
Users, IT in Privacy 'Arms Race'
News  |  9/29/2006  | 
Users bring anonymous browsing tools to work, evoking the ire of IT departments
Six Charged in AOL Phishing Scam
News  |  9/28/2006  | 
Department of Justice alleges fraud conspiracy by attackers in Connecticut
IT Pros Wrestle With Ethics
News  |  9/27/2006  | 
Preliminary results of Dark Reading's survey show that the rules aren't always well-defined, or followed, in the data center
Spammers Attack IT
News  |  9/26/2006  | 
A new wave of spam attacks uses 'IT-speak' to escape filters and fool data center staff
Hackers Target Consumers
News  |  9/25/2006  | 
Two new studies show consumers still clueless about computer security, and hungry attackers putting them high on the menu
Vendors Get the NAC, But Will Users?
News  |  9/20/2006  | 
While vendors rolled out product after product for NAC at Interop, experts are wondering how enterprises will make the technology work
Cymphonix Undoes Anonymous Activity
News  |  9/19/2006  | 
New tool lets IT block anonymous proxies, making it harder for end users to hide their behavior online
Juniper Chief Touts SOA
News  |  9/19/2006  | 
Kriens tells Interop crowd that Services Oriented Architecture will drive major shifts in security, infrastructure
Getting Ready For NAC/NAP
News  |  9/19/2006  | 
Wait or act now? Here's how to prepare for and address issues arising from the Cisco/Microsoft joint initiative
A New Way to Beat Spam?
News  |  9/15/2006  | 
Georgia Tech researchers say they can detect spam at network level, bypassing spotty content-filtering schemes
Biz Giants Form Fraud Standards Group
News  |  9/14/2006  | 
American National Standards Institute, Better Business Bureau to fight identity theft and fraud
Study: Browsers Are Chief Virus Carrier
News  |  9/13/2006  | 
A new IDC study finds browsing of unknown Websites is more likely to cause the spread of viruses and worms than email attachments
IBM's Security Answer: Tape It Up
News  |  9/12/2006  | 
New tape drive system automatically encrypts all data, foiling would-be hackers and careless handlers, Big Blue says
Symantec & Juniper Join Forces
News  |  9/12/2006  | 
Symantec and Juniper Networks partner, but experts are skeptical about its impact
Fantasy Site Hack Exposes Data on 650,000 Users
News  |  9/11/2006  | 
Users of Second Life site forced to change passwords after zero-day exploit hits Web server
Credit Card Giants Modify Security Specs
News  |  9/8/2006  | 
Payment Card Industry (PCI) authorities clarify merchant security standards, but experts aren't sure compliance will be much easier
Stolen Data's Black Market
News  |  9/7/2006  | 
Organized crime is chief buyer for information stolen by hackers and insiders, experts say
Researchers Challenge DOS Attack Data
News  |  9/6/2006  | 
Nearly three-quarters of denial-of-service attacks come from a small number of troublemakers, new research says
Rootkit Changes Search Results
News  |  9/1/2006  | 
Zcodec exploit combines rootkit with social engineering, Trojans to avoid detection


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-46346
PUBLISHED: 2022-01-20
There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.
CVE-2021-46347
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
CVE-2021-46348
PUBLISHED: 2022-01-20
There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0.
CVE-2021-46349
PUBLISHED: 2022-01-20
There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
CVE-2021-46350
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.