Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

DarkReadingTim
Member Since: March 12, 2014
Strategist
Blog Posts: 1718
Posts: 238

posted in September 2008

26 items
Study: Routine Misbehavior by End Users Can Lead to Major Data Leaks
News  |  9/30/2008  | 
Many end users don't understand the risks associated with breaking company security policies, report says
Yahoo! Japan Auctions Compromised, Report Says
News  |  9/29/2008  | 
Thieves may have accessed Web auction site as many as 1.5 million times since May
Theft at RAF Facility Endangers Personal Data of 50,000
Quick Hits  |  9/29/2008  | 
Data on British air force hard drives wasn't encrypted; old facility 'wasn't that secure,' reports say
New ID Theft Service Crawls the Web on Consumers' Behalf
News  |  9/26/2008  | 
For $15, Affinion penetrates hacker chat rooms and warns users when their data is for sale
Many PC Users Remain Unaware of Security, Privacy
Quick Hits  |  9/24/2008  | 
More than a tenth of users don't know whether they have an antivirus, firewall; majority don't know what privacy settings they're using
For US Enterprises, Computer Crime Starts at Home
News  |  9/23/2008  | 
Despite perceptions about overseas hackers, attacks increasingly emanate from domestic sources, studies say
US-Based Malware Network Shuts Down
News  |  9/22/2008  | 
Network that served large numbers of hackers is no longer in service, observers say
Employees Still Flouting Security Policies, Study Says
Quick Hits  |  9/22/2008  | 
Three in 10 enterprises say their business' security is being compromised by personal use of corporate systems
Experts: US Is Not Prepared to Handle Cyber Attacks
News  |  9/19/2008  | 
In Congressional testimony, authorities on cyber defense say neither government agencies nor private companies are ready for what may come
Research: Porn Is Losing Its Steam
Quick Hits  |  9/19/2008  | 
Separate reports both say lurid material no longer rules Web traffic trends
Porn Operators Hijack Pages on AARP Website
News  |  9/18/2008  | 
Multi-pronged attack shows weakness in custom content management systems, researcher says
Antivirus Vendors Push Toward Cloud Computing
News  |  9/17/2008  | 
Key elements of software now being delivered on a software-as-a-service basis
House Passes Identity Theft & Restitution Act
Quick Hits  |  9/17/2008  | 
Senate to consider bill that addresses data theft, use of keyloggers and spyware
Enterprises Gearing Up for Identity, Compliance Management Next Year
News  |  9/16/2008  | 
Security event management, database security also rank high among near-term plans
Lost Computer Exposes Data of 22,000 at Intuit
Quick Hits  |  9/15/2008  | 
Software company's loss was one of many resulting from burglary at HR outsourcing firm
Report: Unauthorized Apps Run Rampant on Many Enterprise Networks
News  |  9/15/2008  | 
Detailed analysis of traffic on 60 enterprise networks finds broad usage of software that isn't sanctioned by IT
Dark Reading Launches Security Survey
Quick Hits  |  9/12/2008  | 
Study seeks to find out your attitudes on a wide variety of security issues
Enterprises Struggle to Identify Sources of Risk
News  |  9/11/2008  | 
Security remains top priority, but businesses wrestle with business case, BT study says
Most Companies Believe Their Sensitive Data Is at Risk
Quick Hits  |  9/10/2008  | 
Enterprises recognize the threat of data theft, Finjan research study says
'Password Recovery' Services May Be Hackers for Hire
News  |  9/10/2008  | 
Services that promise to help you find your lost passwords may make their living by cracking the passwords of others, IBM researcher says
Cisco Packages Home Office Security
News  |  9/9/2008  | 
Cisco Virtual Office promises to ease installation, administration of secure telecommuter links
Court Rules Employee Has No Right to Privacy on Company PC
Quick Hits  |  9/8/2008  | 
Challenge to privacy laws is shot down in New Jersey court
Threat From DNS Bug Isn't Over, Experts Say
News  |  9/8/2008  | 
Further patches expected by year's end; basic flaws in critical Internet technology still unresolved
What You Really Need to Know About Data Leak Prevention
News  |  9/5/2008  | 
Forrester analyst Thomas Raschke cuts through the hype to answer some of the FAQs about emerging DLP technology
Forrester: Roles, Methods of Security Are Changing in Business
News  |  9/4/2008  | 
While security increases in responsibility and budget, its organization and practices are shifting strongly, research firm says
Experts Question Security of Google's Chrome Browser
Quick Hits  |  9/3/2008  | 
Although the browser offers a range of privacy features, security experts expect say Chrome will be a target


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-46346
PUBLISHED: 2022-01-20
There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.
CVE-2021-46347
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
CVE-2021-46348
PUBLISHED: 2022-01-20
There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0.
CVE-2021-46349
PUBLISHED: 2022-01-20
There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
CVE-2021-46350
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.