Commentary

Content posted in April 2006
Do Your Passwords Pass Microsoft's Test?
Commentary  |  4/25/2006  | 
There's a scene in the movie Spaceballs when King Roland, having given in to Dark Helmet's threats, tells him that the combination to his planet's "air shield" is 1, 2, 3, 4, 5. Exasperated, Dark Helmet responds, "That's the stupidest combination I've ever heard in my life! The kind of thing an idiot would have on his luggage!" Moments later, we learn that this is indeed the combination to the evil President Skroob's luggage. At this point, we're pretty sure that Lone Starr and the rest o
Security Research Isn't Pretty, But It's Necessary
Commentary  |  4/17/2006  | 
Security research is a dirty job, but somebody has to do it. Security researchers run an assembly line of self-aggrandizing publicity, churning out press releases and announcements patting themselves on the back for discovering security vulnerabilities in software by Microsoft, Oracle, and other major vendors. The researchers operate under a constant cloud of suspicion: Are they simply creating a climate of useless fear, stifling innovation, E-commerce, and technology implementation? Are they
Software Security Groupies Kiss And Tell
Commentary  |  4/13/2006  | 
Bet you didn't know that software companies, like rock stars, have groupies. Rock star groupies know every word to every one of their favorite band's songs, and they know how to wrangle backstage passes that make them privy to the band's inner workings. In my April 17 article on software companies and the security researcher groupies who love them, I spin a yarn about several instances where researchers found their way onto the proverbial tour bus. Do the people in charge of IT security really w
IT Security: Playing To Win
Commentary  |  4/11/2006  | 
Security company Fortify Software today released a Flash-based game called IT Defender that attempts to educate players about workplace security risks while they risk their jobs by playing a game at work. Sure, it's a PR ploy. But it's a good one. (Really, anything is better than another press release.) As a game, it's nothing groundbreaking, but it's nicely done for what it is.


What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14072
PUBLISHED: 2018-07-15
libsixel 1.8.1 has a memory leak in sixel_decoder_decode in decoder.c, image_buffer_resize in fromsixel.c, and sixel_decode_raw in fromsixel.c.
CVE-2018-14073
PUBLISHED: 2018-07-15
libsixel 1.8.1 has a memory leak in sixel_allocator_new in allocator.c.
CVE-2018-14068
PUBLISHED: 2018-07-15
An issue was discovered in SRCMS V2.3.1. There is a CSRF vulnerability that can add an admin account via admin.php?m=Admin&c=manager&a=add.
CVE-2018-14069
PUBLISHED: 2018-07-15
An issue was discovered in SRCMS V2.3.1. There is a CSRF vulnerability that can add a user account via admin.php?m=Admin&c=member&a=add.
CVE-2018-14066
PUBLISHED: 2018-07-15
The content://wappush content provider in com.android.provider.telephony, as found in some custom ROMs for Android phones, allows SQL injection. One consequence is that an application without the READ_SMS permission can read SMS messages. This affects Infinix X571 phones, as well as various Lenovo p...