Commentary

Content posted in July 2011
Personal Mobile Devices Still Vex IT
Commentary  |  7/26/2011  | 
Two thirds of large enterprises surveyed by Courion say that employees are causing security breaches by connecting personal mobile devices to the corporate network.
Future Clouds: Centralized Or Decentralized?
Commentary  |  7/25/2011  | 
The trend might be moving toward putting more eggs in fewer, more secure baskets
How to Choose A Cloud Storage Provider: Security
Commentary  |  7/21/2011  | 
In the first of a three-part series, we outline security considerations in selecting a place to store your data in the cloud.
A 'Spooks And Suits' Red Team Game
Commentary  |  7/20/2011  | 
Social media apps meet national security
LulzSec Hacks Murdoch's Sun, Cisco Sheds 6,500 Jobs
Commentary  |  7/19/2011  | 
LulzSec's retirees came out of self-imposed exile and played a mean game of bingo against Rupert Murdoch Monday.
Cyber Strategies: National Security Versus Child Pornography
Commentary  |  7/18/2011  | 
Among the interesting findings of an audit of the FBI's cyber crime capabilities: how Congress budgets the bureau, as well as the extent to which all cyber crime is local.
Don't Foist Euro-Style Online Privacy On The U.S.
Commentary  |  7/13/2011  | 
As Congress debates numerous privacy bills, don't assume that the tougher protections afforded by EU law are the right model for the U.S.
Antisec Attacks An Urgent Wake-Up: InformationWeek Now
Commentary  |  7/12/2011  | 
It's difficult to gauge the ethos of these next generation hackers. If I could summarize, it's this: Punish.
Federated Data And Security
Commentary  |  7/12/2011  | 
'Data virtualization' is a misnomer -- it's 'federated data.' Here's why it's important
Murdoch Kills 'News of the World': The Coming Security Backlash
Commentary  |  7/8/2011  | 
News Corp. scandal demonstrates massive shift in how privacy is perceived
Simple Isn't Simple
Commentary  |  7/7/2011  | 
It's time to admit security is hard, and to stop blaming the victims for being human
Low And Slow, Persistence, Loud And Proud, And The Fundamentals
Commentary  |  7/5/2011  | 
The attackers are changing (again), but security fundamentals remain the same -- and we still suck at them


White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14332
PUBLISHED: 2018-07-19
An issue was discovered in Clementine Music Player 1.3.1. Clementine.exe is vulnerable to a user mode write access violation due to a NULL pointer dereference in the Init call in the MoodbarPipeline::NewPadCallback function in moodbar/moodbarpipeline.cpp. The vulnerability is triggered when the user...
CVE-2018-1529
PUBLISHED: 2018-07-19
IBM Rational DOORS Next Generation 5.0 through 5.0.2, 6.0 through 6.0.5 and IBM Rational Requirements Composer 5.0 through 5.0.2 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potential...
CVE-2018-1535
PUBLISHED: 2018-07-19
IBM Rational Rhapsody Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 and IBM Rational Software Architect Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus alteri...
CVE-2018-1536
PUBLISHED: 2018-07-19
IBM Rational Rhapsody Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 and IBM Rational Software Architect Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus alteri...
CVE-2018-1585
PUBLISHED: 2018-07-19
IBM Rational Rhapsody Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 and IBM Rational Software Architect Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus alteri...