Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in March 2006
Check Point Made The Right Move In Dropping Sourcefire Bid
Commentary  |  3/30/2006  | 
The fastest way to obscurity in the security market is to worry about yesterday's problems. Check Point Software Technologies is looking to put its aborted bid to buy Sourcefire behind it. Once the deal came under the scrutiny of the Committee on Foreign Investment in the United States, both companies would have been wrapped up in red tape for months. Unacceptable in the fast-moving world of IT security.
When It Comes To Data, We Just Still Don't Get It
Commentary  |  3/30/2006  | 
This whole information mismanagement thing is really starting to concern me. If we're to draw conclusions from recent developments, we, the nation that has mastered the art of creating an information economy while shipping most of the actual production of real goods overseas, appear to have no idea what we're doing with electronic data.
Data Security: Out To Lunch, Er, Dinner
Commentary  |  3/27/2006  | 
It was just last week that InformationWeek published the latest exhaustive analysis of what's emerging as the IT story of the first decade of this century: complete corporate and government ineptitude when it comes to managing sensitive personal data.
Confessions Of An Adware Purveyor
Commentary  |  3/27/2006  | 
York Baur acknowledges that 180solutions' original approach to spreading adware among the Internet masses wasn't properly executed by the company. "Lots of criticisms have been levied against 180, but I think the only valid criticism was that we were perhaps naïve about the world of Web publishing earlier on in our history, and it has taken us through 2005 to truly take control of that ownership of that network and get practices that we think are poor cleaned up," says Baur, 180solutions' e
Finger-Pointing Abounds As Customers Are Fleeced
Commentary  |  3/21/2006  | 
In June, Frank Robertson could be sentenced to spend the next 15 years in a New Jersey state prison as punishment for his role in one of the biggest payment-card frauds pulled off to date. Robertson and 13 other men were arrested in December in connection with a heist that stretches across the U.S. and into Eastern Europe, with more than $3 million in goods stolen along the way, mostly high-end electronics. The repercussions of this crime will ripple throughout the financial services, retail, an
Securing A Solution To Data Theft
Commentary  |  3/20/2006  | 
One of the most popular stories on our site over the last two weeks was "PIN Scandal 'Worst Hack Ever'; Citibank Only The Start," followed closely by "International Citibank Customers Shaken By Data Breach." Day after day, one or both made our list of the five most popular headlines. I'm guessing another story posted Monday, about
The War On Malware Goes Mobile
Commentary  |  3/10/2006  | 
Remember the good old days, when your only concern about issuing and managing cell phones and PDAs was that someone would leave theirs in a taxi or on an airplane? Now viruses and mobile malware have reared their ugly heads, further convincing IT departments that BlackBerrys, cell phones, laptops, and PDAs must be locked down with as much vigor as back-end systems. The result is a slew of mobile data security options that include mobile encryption and even a kill switch for data should it fall i
If You Can't Trust Your Bank, Who Can You Trust?
Commentary  |  3/9/2006  | 
You're traveling out of the country, for business or on vacation, and you decide it's time for lunch. You're about to hail a taxi to take you to that fantastic café you passed by this morning, but first you figure you might was well get some cash. No problem, there's even a branch of your local bank nearby. Well, maybe there is a problem. The ATM refuses to give you any money, informing you that your transaction cannot be completed and you should call your bank. You pull out your cell phone
Rootkit Evangelist Holy_father Abandons His Mission
Commentary  |  3/7/2006  | 
His mission unfulfilled, Holy_father has nonetheless stopped offering his Hacker Defender rootkit anti-detection services. I blogged in January about Holy_father's calling, which, he says, is to challenge the IT security industry by providing hackers with rootkits that can be used to install malware


Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12524
PUBLISHED: 2020-12-02
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).
CVE-2020-14369
PUBLISHED: 2020-12-02
This release fixes a Cross Site Request Forgery vulnerability was found in Red Hat CloudForms which forces end users to execute unwanted actions on a web application in which the user is currently authenticated. An attacker can make a forgery HTTP request to the server by crafting custom flash file ...
CVE-2020-25638
PUBLISHED: 2020-12-02
A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized informat...
CVE-2020-28272
PUBLISHED: 2020-12-02
Prototype pollution vulnerability in 'keyget' versions 1.0.0 through 2.2.0 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-28273
PUBLISHED: 2020-12-02
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.