Dark Reading Article Boards
Latest Message Boards
Page 1 / 2   >   >>
Cyber Security Needs Its Ralph Nader
Last Message: 11/24/2014
 |  Comments: 2
Russian Cyber Espionage Under The Microscope
Last Message: 11/24/2014
 |  Comments: 8
How I Became A CISO: Mark Potter, Danya International
Last Message: 11/24/2014
 |  Comments: 1
Cloud Security By The Numbers
Last Message: 11/24/2014
 |  Comments: 4
Dairy Queen Breach Shines Light On Impact Of 3rd-Party Breaches
Last Message: 11/24/2014
 |  Comments: 7
Internet Architecture Board Calls For Net Encryption By Default
Last Message: 11/24/2014
 |  Comments: 10
You’re Doing BYOD Wrong: These Numbers Prove It
Last Message: 11/24/2014
 |  Comments: 2
New Certification Authority To Offer Free Certs For HTTPS
Last Message: 11/24/2014
 |  Comments: 5
The Week When Attackers Started Winning The War On Trust
Last Message: 11/24/2014
 |  Comments: 1
The Year Of The Retailer Data Breach
Last Message: 11/22/2014
 |  Comments: 4
ID Theft Monitoring Services: What You Need To Know
Last Message: 11/22/2014
 |  Comments: 3
FreedomPop Debuts Encrypted Snowden Phone
Last Message: 11/21/2014
 |  Comments: 5
How Enterprises Can Get The Most From Threat Intelligence
Last Message: 11/21/2014
 |  Comments: 2
New Citadel Attack Targets Password Managers
Last Message: 11/21/2014
 |  Comments: 3
Surveillance Cameras Next On The Insecure IoT List
Last Message: 11/21/2014
 |  Comments: 2
Retail Hacking: What To Expect This Holiday Season
Last Message: 11/21/2014
 |  Comments: 4
Killing Passwords: Don’t Get A-Twitter Over ‘Digits’
Last Message: 11/21/2014
 |  Comments: 5
Enter The Digital Risk Officer
Last Message: 11/21/2014
 |  Comments: 1
The World's Most Hackable Cars
Last Message: 11/21/2014
 |  Comments: 25
Is Security Awareness Training Really Worth It?
Last Message: 11/20/2014
 |  Comments: 9
Rethinking Security With A System Of 'Checks & Balances'
Last Message: 11/20/2014
 |  Comments: 7
Time To Turn The Tables On Attackers
Last Message: 11/20/2014
 |  Comments: 5
Microsoft Issues Emergency Patch Amid Targeted Attacks
Last Message: 11/19/2014
 |  Comments: 2
'Misdial Trap' Phone Scam Hits Financial Services
Last Message: 11/19/2014
 |  Comments: 2
Retail Hacking: What To Expect This Holiday Season
Last Message: 11/19/2014
 |  Comments: 95
Deconstructing the Cyber Kill Chain
Last Message: 11/19/2014
 |  Comments: 4
Why Cyber Security Starts At Home
Last Message: 11/18/2014
 |  Comments: 13
Is Rogue IT Really A Problem?
Last Message: 11/18/2014
 |  Comments: 1
POS Malware Continues To Evolve
Last Message: 11/17/2014
 |  Comments: 7
'Bashlite' Malware Leverages ShellShock In BusyBox Attack
Last Message: 11/17/2014
 |  Comments: 4
NOAA Blames China In Hack, Breaks Disclosure Rules
Last Message: 11/17/2014
 |  Comments: 2
Smart Meter Hack Shuts Off The Lights
Last Message: 11/16/2014
 |  Comments: 5
Financial Breaches Show ‘Trust Model’ Is Broken
Last Message: 11/15/2014
 |  Comments: 7
How I Became A CISO: Jennings Aske, Nuance Communications
Last Message: 11/15/2014
 |  Comments: 9
Stuxnet 'Patient Zero' Attack Targets Revealed
Last Message: 11/13/2014
 |  Comments: 5
How I Became A CISO: Quinn Shamblin, Boston University
Last Message: 11/13/2014
 |  Comments: 3
iOS 8 Vs. Android: How Secure Is Your Data?
Last Message: 11/13/2014
 |  Comments: 4
3 IT Practices That Add Risk To Cloud
Last Message: 11/13/2014
 |  Comments: 2
Better Together: Why Cyber Security Vendors Are Teaming Up
Last Message: 11/12/2014
 |  Comments: 6
The Staggering Complexity of Application Security
Last Message: 11/12/2014
 |  Comments: 6
Drag Your Adolescent Incident-Response Program Into Adulthood
Last Message: 11/12/2014
 |  Comments: 2
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2010-5312
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.

CVE-2012-6662
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.

CVE-2014-1424
Published: 2014-11-24
apparmor_parser in the apparmor package before 2.8.95~2430-0ubuntu5.1 in Ubuntu 14.04 allows attackers to bypass AppArmor policies via unspecified vectors, related to a "miscompilation flaw."

CVE-2014-7817
Published: 2014-11-24
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

CVE-2014-7821
Published: 2014-11-24
OpenStack Neutron before 2014.1.4 and 2014.2.x before 2014.2.1 allows remote authenticated users to cause a denial of service (crash) via a crafted dns_nameservers value in the DNS configuration.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?