Vulnerabilities / Threats

9/21/2015
10:45 AM
John Klossner
John Klossner
Cartoon Contest
100%
0%

Cartoon: Dating (In)security

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
vanquez
50%
50%
vanquez,
User Rank: Apprentice
8/25/2017 | 6:02:41 AM
Great post
What a great post, I like it very much. I like your site and I can see that you are providing a lot of information continuously that is really useful to me. Keep sharing some more videos; I would love to see some more interesting videos so keep posting, Thanks.

Leannebakerjali
50%
50%
Leannebakerjali,
User Rank: Apprentice
1/12/2016 | 9:21:45 AM
Re: LOL
nice one good
Ronaldinhopal
50%
50%
Ronaldinhopal,
User Rank: Apprentice
1/2/2016 | 6:17:34 AM
Re: LOL
great post
makemyassignments.com
50%
50%
makemyassignments.com,
User Rank: Strategist
10/27/2015 | 3:19:27 PM
LOL
At least they offer discretion for relationships :D
Whoopty
100%
0%
Whoopty,
User Rank: Ninja
10/14/2015 | 7:58:53 AM
Re: AM
Aaaand fake accounts from employees. And spammers. And escorts. 
Enrico Fontan
100%
0%
Enrico Fontan,
User Rank: Strategist
10/1/2015 | 12:31:41 PM
Contract terms
Things to Consider Before Signing a Contract...
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
9/23/2015 | 9:37:20 PM
AM
"And by 'relationships,' we mean emotional entanglements with bots."
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
2018 on Track to Be One of the Worst Ever for Data Breaches
Jai Vijayan, Freelance writer,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14934
PUBLISHED: 2018-11-15
The Bluetooth subsystem on Polycom Trio devices with software before 5.5.4 has Incorrect Access Control. An attacker can connect without authentication and subsequently record audio from the device microphone.
CVE-2018-14935
PUBLISHED: 2018-11-15
The Web administration console on Polycom Trio devices with software before 5.5.4 has XSS.
CVE-2018-16619
PUBLISHED: 2018-11-15
Sonatype Nexus Repository Manager before 3.14 allows XSS.
CVE-2018-16620
PUBLISHED: 2018-11-15
Sonatype Nexus Repository Manager before 3.14 has Incorrect Access Control.
CVE-2018-16621
PUBLISHED: 2018-11-15
Sonatype Nexus Repository Manager before 3.14 allows Java Expression Language Injection.