Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

Content posted in April 2009
<<   <   Page 2 / 2
SCADA Security: What SCADA Security?
Commentary  |  4/7/2009  | 
SCADA, the control systems for such infrastructure services as water and energy, has us worried whenever critical infrastructure defense is mentioned. Why, then, is it the most insecure industry on the planet?
Public More Scared Of Digital Dangers Than National Security Threats
Commentary  |  4/7/2009  | 
A new study finds that Americans are more concerned about identity theft than they are about national security. Could be they're right. And right or wrong, there are lessons here that affect your customers, partners, and employees
Register.com Suffered Massive Denial-of-Service Attack
Commentary  |  4/6/2009  | 
Anyone dependent on domain name registrar and hosting company Register.com, for either hosting their Web site or e-mail, learned first hand the pain of a distributed denial-of-service attack.
The Week After: Conflicted About Conficker
Commentary  |  4/6/2009  | 
The title says it all. With so much hype surrounding last week's impending destruction of the Internet, I started out a bit lackadaisical when people asked me about Conficker. As the week progressed, I started to feel annoyed and slightly hostile because so many people were coming to me to ask what was going to happen and how should they protect themselves. In hindsight, I should be happy at the new awareness brought on by Conficker, but I'm not.
Scanning Flash Apps For Insecurities
Commentary  |  4/3/2009  | 
Did you know that a simple Flash application on your Website could be a backdoor into your network? I've always known of such insecurities in Flash applications, but until recently, I had only looked at some Flash-based malware using Flare to analyze suspected malicious SWF files. All that has all changed with HP's new SWFScan tool,
More Mailicious Sites Than Ever. More On The Way.
Commentary  |  4/3/2009  | 
The number of malicious sites detected in March jumped by almost 200% over February, according to a new report from MessageLabs. The increase consists primarily image-based malware: time to warn your employees (and everybody else) about the risks of image-sharing sites, including social nets.
Getting Physical With Workstation Security
Commentary  |  4/2/2009  | 
So often we as security professionals talk about the security of the machines we're responsible for, and the only time physical security comes up is during the discussion of laptops and server rooms. We're concerned about laptop theft and loss that could lead to the dreaded customer notification process. Or maybe we brag about the awesome security of our datacenter. What about user workstations? Is there an subconscious assumption they're safe since they're behind locked doors?
Home Worker Security Is Business Security
Commentary  |  4/2/2009  | 
The news that IBM will no longer reimburse home-based workers for their Internet connections makes you wonder if Big Blue is going to make home-workers and telecommuters responsible for their own security. And that raises the question of how far you should go to make sure your off-site employees are using sound security sound security practices and procedures.
Archiving Your Way To Efficiency
Commentary  |  4/2/2009  | 
In an earlier post, You Can't DeDupe IT Administration, I discuss the problem with optimizing primary storage. While it is incredibly valuable to be able to squeeze more data into less storage footprint, from an administrative standpoint you still have to manage the data, there is limited increase in efficiency. Archiving however, especially disk based archive can provide tremendous gains in efficiency.
Anticipating Government Overreaction To An Actual Conficker Attack
Commentary  |  4/1/2009  | 
Most governments tend to overreact, and the U.S. probably leads the pack. Fortunately, we survived Conficker on Wednesday, but what if it had resulted in a massive amount of damage? Would the government's response have done more damage than the worm?
Conficker Communicates With Command; Conficker Media Communicators Miss An Opportunity
Commentary  |  4/1/2009  | 
As generally anticipated in the tech press, the Conficker worm communicated with its controllers, downloading new instructions, but otherwise failing to cause problems. Problems, though, were what many in the mainstream press were looking for, and therein lies a problem itself.
Dark Reading Launches Security Services Tech Center
Commentary  |  4/1/2009  | 
Today Dark Reading launches a new feature: the Security Services Tech Center, a subsite of Dark Reading devoted to bringing you news, product information, opinion, and analysis of the "outsourced" security services and technologies available to augment your organization's IT defenses.
<<   <   Page 2 / 2


News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-35519
PUBLISHED: 2021-05-06
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel i...
CVE-2021-20204
PUBLISHED: 2021-05-06
A heap memory corruption problem (use after free) can be triggered in libgetdata v0.10.0 when processing maliciously crafted dirfile databases. This degrades the confidentiality, integrity and availability of third-party software that uses libgetdata as a library. This vulnerability may lead to arbi...
CVE-2021-30473
PUBLISHED: 2021-05-06
aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap.
CVE-2021-32030
PUBLISHED: 2021-05-06
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_chec...
CVE-2021-22209
PUBLISHED: 2021-05-06
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed.