Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in September 2010

21 items
More Than 80 Arrested In Alleged Zeus Banking Scam
News  |  9/30/2010  | 
Eastern European cybercriminals teamed with foreign students who opened accounts in the U.S., authorities say
Spam Campaign Targeting LinkedIn Users Called 'Largest Ever'
Quick Hits  |  9/29/2010  | 
Fake social networking message leads users to Zeus infection
U.S. Public, Private Cyber Defenses Being Tested In Simulated Attacks
News  |  9/29/2010  | 
Cyber Storm III under way; biennial cybersecurity exercise aims to test preparedness
Security Researcher Wins Prestigious MacArthur "Genius" Grant
News  |  9/29/2010  | 
Dawn Song, head of the Berkeley lab that developed BitBlaze, will get $500,000 for more research
Security Is Chief Inhibitor To Web 2.0 Implementation, Study Finds
Quick Hits  |  9/27/2010  | 
Malware, viruses are key reasons why companies don't use Web 2.0 apps more widely, researchers say
After HP Acquisition, ArcSight Lays Groundwork For Future At User Conference
News  |  9/22/2010  | 
HP exec says "a new approach is needed" for security
Most Websites Have Serious Vulnerabilities To Attack, Study Says
Quick Hits  |  9/22/2010  | 
Large sites have an average of 13 serious vulnerabilities; smaller sites have slightly fewer
Fraudsters Attempt To Steal Interpol Chief's Identity Via Facebook
Quick Hits  |  9/19/2010  | 
Interpol Secretary General Noble says bold criminals tried to impersonate him online
Former Contractors Indicted For Leaking U.S. Nuclear Secrets
Quick Hits  |  9/17/2010  | 
Man and wife who worked at Los Alamos National Labs allegedly tried to sell secrets to FBI agent posing as Venezuelan official
Study Suggests Differences Between Security Perceptions, Reality
News  |  9/16/2010  | 
Newer technologies considered more effective than traditional standbys; many don't know whether their organization has been breached
Four Out Of 10 PC Apps Are Pirated, BSA Study Says
Quick Hits  |  9/15/2010  | 
Otherwise legitimate businesses are primary offenders, according to study
Number Of Malware-Infected Websites Tops 1 Million Mark
News  |  9/15/2010  | 
More than 1.3 million sites infected in Q2, Dasient says; more than 200,000 infections cataloged
Dark Reading Launches Tech Center On Security Monitoring
Commentary  |  9/14/2010  | 
Today Dark Reading launches a new feature: the Security Monitoring Tech Center, a subsite of Dark Reading devoted to bringing you news, insight, and in-depth reporting on the topic of security data monitoring and analysis.
Secure App Development Can Lead To Cost Savings, Study Says
Quick Hits  |  9/13/2010  | 
Companies that fix vulnerabilities during development process could save as much as $2.4 million a year, according to report
HP Continues Security Push With $1.5B Purchase Of SIEM Vendor ArcSight
News  |  9/13/2010  | 
Following up recent purchase of Fortify, HP's software unit pledges to make security "a core competency"
A Cybercriminal's Shopping List
Quick Hits  |  9/10/2010  | 
Credit card data can be purchased for as little as $1.50; DDoS attacks cost $50 for 24 hours
Study: Majority Of Consumers Have Been Cybercrime Victims
News  |  9/10/2010  | 
Nearly 80 percent believe attackers will never be brought to justice
Microsoft Gets Legal Approval To Acquire Former Waledac Domains
Quick Hits  |  9/8/2010  | 
Acquisition of 276 domains will put dangerous botnet down for good, software giant says
Hackers Miss Their Target -- By About 2,000 Miles
Quick Hits  |  9/3/2010  | 
Arab "cyber-pirates" deface English tourist attraction instead of Israeli stronghold
Networked Scanners Offer A Window Into The Enterprise, Researcher Says
News  |  9/1/2010  | 
Emerging Web-based features make it possible to capture document contents remotely, Zscaler's Sutton warns
Misconfigured Networks Are Easiest Prey, Hacker Survey Says
Quick Hits  |  9/1/2010  | 
Network vulnerabilities are simple to find, easy to attack, DEFCON survey respondents say

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-28
Products.ATContentTypes are the core content types for Plone 2.1 - 4.3. Versions of Plone that are dependent on Products.ATContentTypes prior to version 3.0.6 are vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscree...
PUBLISHED: 2022-01-28
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
PUBLISHED: 2022-01-28
Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in ...
PUBLISHED: 2022-01-28
laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value w...
PUBLISHED: 2022-01-28
There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis sug...