Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in November 2007
Temp Workers Pose Large Security Challenge
Commentary  |  11/30/2007  | 
Adding extra help for the holiday rush -- or any crunch-period -- requires taking extra time to seal any potential security holes. But according to Websense, many of you won't.
New TrustedSource Threat Portal Shows You Where The Bad Stuff Is
Commentary  |  11/27/2007  | 
The latest update of Secure Computing's TrustedSource.org threat intelligence portal goes live today -- and provides a frightening look at the threat environment we live and work in.
Integrated Security Suites Attempt to Ease Management Chores
Commentary  |  11/27/2007  | 
Tired of trying to maintain and update a handful of different security products? Then security supplier Sophos offers you an alternative : the Sophos Security Suite Small Business Edition, one in a growing of integrated security suites.
Software Anti-Piracy Efforts Target Small Business
Commentary  |  11/26/2007  | 
Why are the big software companies going after small businesses for software piracy? Because they can!
Security Players Pick Top Threats You Should Be Worried About
Commentary  |  11/19/2007  | 
Next year's biggest security threats for small and midsize businesses? More of the same with differences, according to Symantec and McAfee's seers.
Real Security Means Securing Every Point, Not Just Entry Points And End Points
Commentary  |  11/16/2007  | 
A good recent book about effective network defense, written by a Cisco security engineer, has plenty to say to anyone trying to defend a network, whatever its size, and, to a point, whatever hardware it rests upon.
Some Data Protection Miscreants Never Learn
Commentary  |  11/15/2007  | 
We know the gory details about TJX Cos. and its mind-boggling data breach. But a hard-hitting new report on the worst data offenders from Byte & Switch shows that in some cases these organizations still haven't cleaned up their security act. Following their own high-profile breaches, the goings-on at Los Alamos National Laboratory, the Department of Veterans Affairs, and Iron Mountain are shocking indeed.
Hats Off to the Feds
Commentary  |  11/15/2007  | 
One of the deviants who spend their time writing software to wreak havoc with your companys computers will be spending a long time, as many as 60 years, in jail, thanks to the work of the Federal Bureau of Investigation.
Next Year's Top Security Threats? Here's One Early Take
Commentary  |  11/13/2007  | 
Too soon to start worrying about next year's threats? Not hardly -- and the prognostications are already starting to proliferate.
Security Threats Keeping You Up Nights?
Commentary  |  11/9/2007  | 
Nice new approach to security survey questions: what threats cost you the most sleep? For government workers the answer includes bots, spyware and breaches.
Hackers Now Preying on Your Sympathy
Commentary  |  11/8/2007  | 
When tragedy strikes, small and medium businesses as well as individuals often reach into their pockets and help. Unfortunately, that willingness to offer assistance to others in their time of need is turning them into fodder for hackers.
Security Training: Take This Job And Secure It!
Commentary  |  11/6/2007  | 
Did you hear the one about the technology that was changing the way people do business? The one everybody wanted but nobody wanted to learn how to use safely?
Big Blue Security Lessons For Small And Midsized Businesses?
Commentary  |  11/5/2007  | 
IBM's planning on pumping a whopping (even for IBM) $1.5 billion into security research next year. Their target? You, me, our colleagues and employees.


Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12524
PUBLISHED: 2020-12-02
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).
CVE-2020-14369
PUBLISHED: 2020-12-02
This release fixes a Cross Site Request Forgery vulnerability was found in Red Hat CloudForms which forces end users to execute unwanted actions on a web application in which the user is currently authenticated. An attacker can make a forgery HTTP request to the server by crafting custom flash file ...
CVE-2020-25638
PUBLISHED: 2020-12-02
A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized informat...
CVE-2020-28272
PUBLISHED: 2020-12-02
Prototype pollution vulnerability in 'keyget' versions 1.0.0 through 2.2.0 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-28273
PUBLISHED: 2020-12-02
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.