Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in February 2008
<<   <   Page 2 / 2
Europe: For All Your Spam Needs
Commentary  |  2/6/2008  | 
Europe has been taking the lead in several areas of technology lately. The European Space Agency (ESA) will be the first to send an unmanned cargo ship to the international space station. London will be Europe's first city to get A380 Airbus service. Now Europe claims another 'accolade' -- Symantec sa
National Intelligence Director: Cyber Risks Rising
Commentary  |  2/6/2008  | 
The news provided by the director of national intelligence, Mike McConnell, to a Senate panel yesterday wasn't all good. While Al-Qaida is weakening in Iraq, it's spreading its tentacles elsewhere. That includes the critical IT infrastructure. Part of his testimony included warnings that the threat of cyberattacks are increasing from terror groups, homegrown militants, and nations.
Remote Worker Worries: On The Road With Their Guards Down
Commentary  |  2/6/2008  | 
A couple of items recently caught by the bMighty ANTenna ought to have your own security antennae twitching at full alert. The combination of remote workers and more powerful mobile devices could be setting up a perfect storm of security woes.
Electronic Voting Systems Go Unattended
Commentary  |  2/5/2008  | 
It's been nearly eight years since the 2000 election fiasco, and it seems with every election, the complaints of failing voting systems only seem to mount.
Just in Time For 'Hannah Montana'
Commentary  |  2/5/2008  | 
I'm not a reflexive technophobe or a Chomsky-quoting art school washout (more of a Sam Kinison plagiarist here, minus the beret). But it still beats the pants off me why anybody would want to watch a movie on a device smaller than a laptop. My inability to comprehend isn't stopping Apple from adding memory to its consumer goo
Internet Voting: Bad Or Good Idea?
Commentary  |  2/5/2008  | 
It's Super Tuesday, perhaps the most critical day for the presidential election until the general elections this fall. And some voters abroad will have the option to cast their ballot online. That's online, as in over the Internet. Are we really ready for this?
Dell Looks To iSCSI To Restore Former Luster
Commentary  |  2/4/2008  | 
The merger of Dell's manufacturing know-how and EqualLogic's innovation were supposed to result in all sorts of storage goodies when Dell acquired the company late last year. Now, if the combined assets could just fix the rest of what's ailing Dell.
New Botnet Army On The March
Commentary  |  2/4/2008  | 
There's a new botnet (a network of malicious nodes, known as "bots") gaining strength, and it's successfully infiltrating U.S. companies by bypassing traditional antivirus products.
Microsoft, Yahoo, And OpenID
Commentary  |  2/4/2008  | 
Now that it seems highly likely that Microsoft will acquire Yahoo (unless News Corp., or even Apple, start a bidding war), what will the impact be on OpenID -- if any?
Super Bowl. Robo Security.
Commentary  |  2/2/2008  | 
While the Department of Homeland Security says there are no specific terror threats regarding Super Bowl XLII, security is being taken seriously at the game, where the New England Patriots will face off against the New York Giants.
Economy To Test Storage Vendors' Durability
Commentary  |  2/1/2008  | 
Is the U.S. economy in a recession? With the Fed cutting interest rates like a tailor on speed, a streaky stock market, and no good news on the employment front, it's safe to say we're at least hip-deep in a contracting economy. And decent financial results from EMC, HP, and others have led some to conclude storage is recession-proof. That may be tr
Forget Terrorists. Watch Out For Backhoes
Commentary  |  2/1/2008  | 
Terrorists may represent some danger to power plants, but human carelessness is far more likely to damage critical infrastructure. Given the events of the past few days, it's hard to believe that al-Qaida would even bother plotting to take down the Internet or a power station when everyday bumbling does the job for them.
Click Fraud Continues Climb
Commentary  |  2/1/2008  | 
Are you paying for clicks? Then you should be aware that last year's growth in fake clicks (that advertisers still have to pay for) set a scary 15 percent pace.
Web 2.0 Security, Microsoft, And Yahoo
Commentary  |  2/1/2008  | 
People always seem to talk about how important application security is to them. But rarely do we --as consumers of technology -- have a chance to have a profound impact on the quality and security of software applications and services. But with Microsoft's pending acquisition of Yahoo, a new opportunity arises.
Lessons Learned from SocGen: Every Employee Matters
Commentary  |  2/1/2008  | 
By now nearly everyone has heard about the rogue trader at SocGen, one of France's largest banks, who managed to cause the bank to lose an astonishing $7.2 billion. But as the details of the case emerge, the lessons learned from the incident apply to all businesses, even smaller ones.
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-32411
PUBLISHED: 2022-07-01
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.
CVE-2022-32412
PUBLISHED: 2022-07-01
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.
CVE-2022-34903
PUBLISHED: 2022-07-01
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
CVE-2022-32324
PUBLISHED: 2022-07-01
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
CVE-2022-32325
PUBLISHED: 2022-07-01
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.