Commentary
Content posted in November 2007
Temp Workers Pose Large Security Challenge
Commentary  |  11/30/2007  | 
Adding extra help for the holiday rush -- or any crunch-period -- requires taking extra time to seal any potential security holes. But according to Websense, many of you won't.
New TrustedSource Threat Portal Shows You Where The Bad Stuff Is
Commentary  |  11/27/2007  | 
The latest update of Secure Computing's TrustedSource.org threat intelligence portal goes live today -- and provides a frightening look at the threat environment we live and work in.
Integrated Security Suites Attempt to Ease Management Chores
Commentary  |  11/27/2007  | 
Tired of trying to maintain and update a handful of different security products? Then security supplier Sophos offers you an alternative : the Sophos Security Suite Small Business Edition, one in a growing of integrated security suites.
Software Anti-Piracy Efforts Target Small Business
Commentary  |  11/26/2007  | 
Why are the big software companies going after small businesses for software piracy? Because they can!
Security Players Pick Top Threats You Should Be Worried About
Commentary  |  11/19/2007  | 
Next year's biggest security threats for small and midsize businesses? More of the same with differences, according to Symantec and McAfee's seers.
Real Security Means Securing Every Point, Not Just Entry Points And End Points
Commentary  |  11/16/2007  | 
A good recent book about effective network defense, written by a Cisco security engineer, has plenty to say to anyone trying to defend a network, whatever its size, and, to a point, whatever hardware it rests upon.
Some Data Protection Miscreants Never Learn
Commentary  |  11/15/2007  | 
We know the gory details about TJX Cos. and its mind-boggling data breach. But a hard-hitting new report on the worst data offenders from Byte & Switch shows that in some cases these organizations still haven't cleaned up their security act. Following their own high-profile breaches, the goings-on at Los Alamos National Laboratory, the Department of Veterans Affairs, and Iron Mountain are shocking indeed.
Hats Off to the Feds
Commentary  |  11/15/2007  | 
One of the deviants who spend their time writing software to wreak havoc with your companys computers will be spending a long time, as many as 60 years, in jail, thanks to the work of the Federal Bureau of Investigation.
Next Year's Top Security Threats? Here's One Early Take
Commentary  |  11/13/2007  | 
Too soon to start worrying about next year's threats? Not hardly -- and the prognostications are already starting to proliferate.
Security Threats Keeping You Up Nights?
Commentary  |  11/9/2007  | 
Nice new approach to security survey questions: what threats cost you the most sleep? For government workers the answer includes bots, spyware and breaches.
Hackers Now Preying on Your Sympathy
Commentary  |  11/8/2007  | 
When tragedy strikes, small and medium businesses as well as individuals often reach into their pockets and help. Unfortunately, that willingness to offer assistance to others in their time of need is turning them into fodder for hackers.
Security Training: Take This Job And Secure It!
Commentary  |  11/6/2007  | 
Did you hear the one about the technology that was changing the way people do business? The one everybody wanted but nobody wanted to learn how to use safely?
Big Blue Security Lessons For Small And Midsized Businesses?
Commentary  |  11/5/2007  | 
IBM's planning on pumping a whopping (even for IBM) $1.5 billion into security research next year. Their target? You, me, our colleagues and employees.


Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.