Dark Reading Article Boards
Latest Message Boards
Page 1 / 2   >   >>
An AppSec Report Card: Developers Barely Passing
Last Message: 9/19/2014
 |  Comments: 1
Is Enterprise IT Security Ready For iOS 8?
Last Message: 9/19/2014
 |  Comments: 3
Data Privacy Etiquette: It's Not Just For Kids
Last Message: 9/19/2014
 |  Comments: 9
Google Backs New Effort To Simplify Security
Last Message: 9/19/2014
 |  Comments: 12
5 Ways To Monitor DNS Traffic For Security Threats
Last Message: 9/19/2014
 |  Comments: 2
DR Radio: A Grown-Up Conversation About Passwords
Last Message: 9/19/2014
 |  Comments: 6
6 Tips For Securing Social Media In The Workplace
Last Message: 9/19/2014
 |  Comments: 11
Meet The Next Next-Gen Firewall
Last Message: 9/18/2014
 |  Comments: 3
Cyberspies Resuscitate Citadel Trojan For Petrochemical Attacks
Last Message: 9/18/2014
 |  Comments: 5
7 Reasons To Love Passwords
Last Message: 9/18/2014
 |  Comments: 3
US Military In The Dark On Cyberattacks Against Contractors
Last Message: 9/18/2014
 |  Comments: 1
Apple Pay Ups Payment Security But PoS Threats Remain
Last Message: 9/18/2014
 |  Comments: 21
In Defense Of Passwords
Last Message: 9/17/2014
 |  Comments: 12
5 Myths: Why We Are All Data Security Risks
Last Message: 9/17/2014
 |  Comments: 12
A Grown-Up Conversation About Passwords
Last Message: 9/17/2014
 |  Comments: 118
Weak Password Advice From Microsoft
Last Message: 9/17/2014
 |  Comments: 16
Worm Illuminates Potential NAS Nightmare
Last Message: 9/17/2014
 |  Comments: 6
Franchising The Chinese APT
Last Message: 9/17/2014
 |  Comments: 7
Google: No Breach In Latest Online Dump Of Credentials
Last Message: 9/17/2014
 |  Comments: 3
Internet Of Things Devices Are Doomed
Last Message: 9/17/2014
 |  Comments: 9
Hacking Password Managers
Last Message: 9/16/2014
 |  Comments: 13
Privacy, Security & The Geography Of Data Protection
Last Message: 9/16/2014
 |  Comments: 6
InfoSec Book Club: What’s On Your Fall Reading List?
Last Message: 9/16/2014
 |  Comments: 6
Why Email Is Worth Saving
Last Message: 9/15/2014
 |  Comments: 11
Apple Pay: A Necessary Push To Transform Consumer Payments
Last Message: 9/15/2014
 |  Comments: 16
Veracode Secures $40M In Funding As IPO Looms
Last Message: 9/15/2014
 |  Comments: 1
Home Depot Breach May Not Be Related To BlackPOS, Target
Last Message: 9/15/2014
 |  Comments: 5
Security Ops Confidence Levels Drop
Last Message: 9/15/2014
 |  Comments: 5
Black Hat & DEF CON: 3 Lessons From A Newbie
Last Message: 9/11/2014
 |  Comments: 7
Poll: Significant Insecurity About Internet of Things
Last Message: 9/11/2014
 |  Comments: 3
Attack Steals Online Banking Credentials From SMBs
Last Message: 9/11/2014
 |  Comments: 1
Hackers Cash In On ATMs
Last Message: 9/10/2014
 |  Comments: 4
Get Smart About Threat Intelligence
Last Message: 9/10/2014
 |  Comments: 10
4 Hurdles To Securing The Internet Of Things
Last Message: 9/10/2014
 |  Comments: 7
Attacker Infects Healthcare.gov Test Server
Last Message: 9/10/2014
 |  Comments: 7
In Cloud We Trust: A New Model
Last Message: 9/10/2014
 |  Comments: 11
Home Depot The Latest Hack Victim?
Last Message: 9/10/2014
 |  Comments: 4
CISO Insider: An Interview with James Christiansen of Accuvant
Last Message: 9/10/2014
 |  Comments: 98
Salesforce Passwords At Risk From Dyre
Last Message: 9/10/2014
 |  Comments: 5
Mobile, Cloud, Partners: Where’s The Weak Link?
Last Message: 9/10/2014
 |  Comments: 1
BlackPOS Implicated in Unconfirmed Home Depot Breach
Last Message: 9/10/2014
 |  Comments: 2
Cartoon: Old-School Biometrics
Last Message: 9/10/2014
 |  Comments: 1
Hacking Humans
Last Message: 9/10/2014
 |  Comments: 1
'Kyle & Stan' Parks Malvertising On Amazon, YouTube
Last Message: 9/9/2014
 |  Comments: 7
Why Are Security Pros Blasé About Compliance?
Last Message: 9/9/2014
 |  Comments: 22
"Google's Privacy Invasion: It's Your Fault"
Last Message: 9/8/2014
 |  Comments: 31
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2006-1318
Published: 2014-09-19
Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, Office 2004 for Mac, and Office X for Mac do not properly parse record lengths, which allows remote attackers to execute arbitrary code via a malformed control in an Office document, aka "Microsoft Office Control Vulnerability."

CVE-2014-1391
Published: 2014-09-19
QT Media Foundation in Apple OS X before 10.9.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file with RLE encoding.

CVE-2014-4350
Published: 2014-09-19
Buffer overflow in QT Media Foundation in Apple OS X before 10.9.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted MIDI file.

CVE-2014-4376
Published: 2014-09-19
IOKit in IOAcceleratorFamily in Apple OS X before 10.9.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via an application that provides crafted API arguments.

CVE-2014-4390
Published: 2014-09-19
Bluetooth in Apple OS X before 10.9.5 does not properly validate API calls, which allows attackers to execute arbitrary code in a privileged context via a crafted application.

Best of the Web
Dark Reading Radio