Commentary

Content posted in March 2006
Check Point Made The Right Move In Dropping Sourcefire Bid
Commentary  |  3/30/2006  | 
The fastest way to obscurity in the security market is to worry about yesterday's problems. Check Point Software Technologies is looking to put its aborted bid to buy Sourcefire behind it. Once the deal came under the scrutiny of the Committee on Foreign Investment in the United States, both companies would have been wrapped up in red tape for months. Unacceptable in the fast-moving world of IT security.
When It Comes To Data, We Just Still Don't Get It
Commentary  |  3/30/2006  | 
This whole information mismanagement thing is really starting to concern me. If we're to draw conclusions from recent developments, we, the nation that has mastered the art of creating an information economy while shipping most of the actual production of real goods overseas, appear to have no idea what we're doing with electronic data.
Data Security: Out To Lunch, Er, Dinner
Commentary  |  3/27/2006  | 
It was just last week that InformationWeek published the latest exhaustive analysis of what's emerging as the IT story of the first decade of this century: complete corporate and government ineptitude when it comes to managing sensitive personal data.
Confessions Of An Adware Purveyor
Commentary  |  3/27/2006  | 
York Baur acknowledges that 180solutions' original approach to spreading adware among the Internet masses wasn't properly executed by the company. "Lots of criticisms have been levied against 180, but I think the only valid criticism was that we were perhaps naïve about the world of Web publishing earlier on in our history, and it has taken us through 2005 to truly take control of that ownership of that network and get practices that we think are poor cleaned up," says Baur, 180solutions' e
Finger-Pointing Abounds As Customers Are Fleeced
Commentary  |  3/21/2006  | 
In June, Frank Robertson could be sentenced to spend the next 15 years in a New Jersey state prison as punishment for his role in one of the biggest payment-card frauds pulled off to date. Robertson and 13 other men were arrested in December in connection with a heist that stretches across the U.S. and into Eastern Europe, with more than $3 million in goods stolen along the way, mostly high-end electronics. The repercussions of this crime will ripple throughout the financial services, retail, an
Securing A Solution To Data Theft
Commentary  |  3/20/2006  | 
One of the most popular stories on our site over the last two weeks was "PIN Scandal 'Worst Hack Ever'; Citibank Only The Start," followed closely by "International Citibank Customers Shaken By Data Breach." Day after day, one or both made our list of the five most popular headlines. I'm guessing another story posted Monday, about
The War On Malware Goes Mobile
Commentary  |  3/10/2006  | 
Remember the good old days, when your only concern about issuing and managing cell phones and PDAs was that someone would leave theirs in a taxi or on an airplane? Now viruses and mobile malware have reared their ugly heads, further convincing IT departments that BlackBerrys, cell phones, laptops, and PDAs must be locked down with as much vigor as back-end systems. The result is a slew of mobile data security options that include mobile encryption and even a kill switch for data should it fall i
If You Can't Trust Your Bank, Who Can You Trust?
Commentary  |  3/9/2006  | 
You're traveling out of the country, for business or on vacation, and you decide it's time for lunch. You're about to hail a taxi to take you to that fantastic café you passed by this morning, but first you figure you might was well get some cash. No problem, there's even a branch of your local bank nearby. Well, maybe there is a problem. The ATM refuses to give you any money, informing you that your transaction cannot be completed and you should call your bank. You pull out your cell phone
Rootkit Evangelist Holy_father Abandons His Mission
Commentary  |  3/7/2006  | 
His mission unfulfilled, Holy_father has nonetheless stopped offering his Hacker Defender rootkit anti-detection services. I blogged in January about Holy_father's calling, which, he says, is to challenge the IT security industry by providing hackers with rootkits that can be used to install malware


White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  7/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3090
PUBLISHED: 2018-07-18
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compr...
CVE-2018-3091
PUBLISHED: 2018-07-18
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compr...
CVE-2018-3092
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...
CVE-2018-3093
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...
CVE-2018-3094
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...