Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in November 2006
E-Tailers Leaving Money On The Table Thanks To Weak Web Sites
Commentary  |  11/30/2006  | 
One week after I'd already bought three holiday presents online I learned that the vast majority of Web sites are vulnerable to attack by malicious hackers and that such security concerns are expected to drive away potential customers who would have shelled out nearly $2 billion online this year. The only real surprise is why those numbers aren't higher.
What Do You Have To Give Them If You Want To Use The Bathroom?
Commentary  |  11/30/2006  | 
An International House of Pancakes (IHOP) restaurant reversed its policy of requiring customers to surrender their driver's licenses before being served, after customers complained about the privacy and identity theft risks. One customer complained: "You want my license? I'm going for pancakes, I'm not buying the Hope diamond." The restaurant was trying to limit "dine-a
The Ripple Effects Of E-Discovery
Commentary  |  11/29/2006  | 
When I last tread this space, it was to alert readers who weren't already aware, of the Dec. 1rst launch of new federal rules regarding electronic discovery. By the way, there's no new law. The new requirements are just an extension of existing rules, which you can find here.
To Improve Holiday Safety, I'll Start A House Fire Every Day In December Using A Different Christmas Decoration
Commentary  |  11/22/2006  | 
The gimmick of churning out software security flaws on a daily basis for some set period has gotten ridiculous. First the Month of Browser Bugs, then the Month of Kernel Bugs, now the research firm firm Argeniss plans the Week of Oracle Database Bugs. Security researchers play an irreplaceable watchdog role. But it's time to retire this publicity stunt.
Making A List And Checking It Twice
Commentary  |  11/21/2006  | 
Thanksgiving on the doorstep means December is just around the corner, bringing with it expressions of cheery good will to all buttressed by those endless, frantic holiday to-do lists. This year, though, before turning out the lights to hit the company party, IT is going to have to check off one more item, and it's a doozy.
Secure U.K. Passport Cracked
Commentary  |  11/17/2006  | 
Two British security experts were able to read encrypted data off a supposedly highly secure U.K. RFID-equipped passport using equipment priced under £250, according to the Guardian..

But is that an impressive hack? The UK government thinks not:

Technology Makes Fraud Trivially Easy
Commentary  |  11/14/2006  | 
Identity theft expert Frank Abagnale describes how technology has made fraud trivially easy:

Abagnale was subject of the 2002 Steven Spielberg movie Catch Me If You Can, starring Leonardo DiCaprio, which depicted his exploits as a teenager in the 60s, posing as an airline pilot to live the glamorous life of a jet-setter around the world, until he was caught.

Best Practices In Smartphone Security
Commentary  |  11/3/2006  | 
Many of you are thinking about giving your employees access to business applications on smartphones. Yet over 60% of you feel your company's smartphones are somewhat secure and that your policies and safeguards need improvement. Security risks will always exist, but there are steps you can take to mitigate them. I thought I'd help by outlining best practices for smartphone security in a list, court
The Surveillance Society: It's Closing In!
Commentary  |  11/2/2006  | 
Sorry 4 typos but I know they're watching--always suspected it but just got confirmation from Reuters news story saying US and UK r as oppressive as China and Russia in terms of spying on citizens--I hear footsteps and know they're coming for me cause I'm speaking out!!


Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12524
PUBLISHED: 2020-12-02
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).
CVE-2020-14369
PUBLISHED: 2020-12-02
This release fixes a Cross Site Request Forgery vulnerability was found in Red Hat CloudForms which forces end users to execute unwanted actions on a web application in which the user is currently authenticated. An attacker can make a forgery HTTP request to the server by crafting custom flash file ...
CVE-2020-25638
PUBLISHED: 2020-12-02
A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized informat...
CVE-2020-28272
PUBLISHED: 2020-12-02
Prototype pollution vulnerability in 'keyget' versions 1.0.0 through 2.2.0 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-28273
PUBLISHED: 2020-12-02
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.