Dark Reading Article Boards
Latest Message Boards
Page 1 / 2   >   >>
Lockheed Martin-Led Consortium Builds Secure 'System Of Systems'
Last Message: 7/29/2015
 |  Comments: 11
New Phishing Campaign Leverages Google Drive
Last Message: 7/28/2015
 |  Comments: 1
What 30 Classic Games Can Teach Us about Security
Last Message: 7/28/2015
 |  Comments: 2
How To Put Data At The Heart Of Your Security Practice
Last Message: 7/28/2015
 |  Comments: 1
Car Hacking Shifts Into High Gear
Last Message: 7/28/2015
 |  Comments: 11
Cartoon: Spring Fever
Last Message: 7/28/2015
 |  Comments: 41
Microsoft Windows 10: Three Security Features To Know About
Last Message: 7/27/2015
 |  Comments: 5
Smartwatches Could Become New Frontier for Cyber Attackers
Last Message: 7/27/2015
 |  Comments: 1
Android Malware On The Rise
Last Message: 7/27/2015
 |  Comments: 1
Mobile App Security: 4 Critical Issues
Last Message: 7/27/2015
 |  Comments: 3
How Hackers Will Crack Your Password
Last Message: 7/25/2015
 |  Comments: 2
So You Think You Know Risk Management
Last Message: 7/25/2015
 |  Comments: 14
OPM: Personal Info On 21.5 Million People Exposed In Hack
Last Message: 7/24/2015
 |  Comments: 13
Emerging Web Infrastructure Threats
Last Message: 7/24/2015
 |  Comments: 1
CISOs Caught In A Catch-22
Last Message: 7/23/2015
 |  Comments: 1
Time’s Running Out For The $76 Billion Detection Industry
Last Message: 7/23/2015
 |  Comments: 2
5 Things You Probably Missed In The Verizon DBIR
Last Message: 7/22/2015
 |  Comments: 6
Hacking Team Detection Tools Released By Rook, Facebook
Last Message: 7/22/2015
 |  Comments: 1
How I Learned To Love Active Defense
Last Message: 7/21/2015
 |  Comments: 1
So, You 'Don’t Believe In' Security Education?
Last Message: 7/21/2015
 |  Comments: 10
4 Ways Cloud Usage Is Putting Health Data At Risk
Last Message: 7/20/2015
 |  Comments: 3
4 Lasting Impacts Of The Hacking Team Leaks
Last Message: 7/20/2015
 |  Comments: 7
10 Trends In Infosec Careers And Staffing
Last Message: 7/19/2015
 |  Comments: 1
Java Back In The Bullseye
Last Message: 7/19/2015
 |  Comments: 2
Hackers Cash In On ATMs
Last Message: 7/18/2015
 |  Comments: 4
"10 Top Password Managers"
Last Message: 7/16/2015
 |  Comments: 42
3 Reasons Why Giving Government A Backdoor Is A Bad Idea
Last Message: 7/16/2015
 |  Comments: 6
The Internet of Things: 7 Scary Security Scenarios
Last Message: 7/16/2015
 |  Comments: 9
Firewall Smackdown
Last Message: 7/15/2015
 |  Comments: 38
Dark Reading Radio: Firewall Smackdown
Last Message: 7/15/2015
 |  Comments: 1
10 Free Or Low-Cost Network Discovery And Mapping Tools
Last Message: 7/14/2015
 |  Comments: 5
How To Make Internet Voting Secure
Last Message: 7/14/2015
 |  Comments: 2
Hacking Group LulzSec Denies Arrest Report
Last Message: 7/11/2015
 |  Comments: 1
Shaping A Better Future For Software Security
Last Message: 7/11/2015
 |  Comments: 4
"NSA Surveillance Can Penetrate VPNs"
Last Message: 7/10/2015
 |  Comments: 3
6 Emerging Android Threats
Last Message: 7/9/2015
 |  Comments: 1
Why Don't IT Generalists Understand Security?
Last Message: 7/9/2015
 |  Comments: 33
Social Engineering & Black Hat: Do As I Do Not As I Say
Last Message: 7/8/2015
 |  Comments: 4
The Rise Of Social Media Botnets
Last Message: 7/8/2015
 |  Comments: 1
Twitter Chat: How To Prepare For A Cyberattack
Last Message: 7/8/2015
 |  Comments: 2
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7912
Published: 2015-07-29
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory c...

CVE-2014-7913
Published: 2015-07-29
The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corru...

CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

CVE-2015-2979
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to execute arbitrary OS commands via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!