Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in March 2007
When The 2 Billionth Customer Record Is Stolen, Insiders Will Be The Most Guilty
Commentary  |  3/30/2007  | 
While I was researching my next story on the danger that employees, contractors, and business partners (i.e., insiders) can place on the security of corporate data, a friend of mine sent me an interesting study that noted, among several other fascinating data points, that last year personal records were compromised at a rate of 5.8 million per month. At this rate, by the end of the year more than 2 billion records
Is The Mac More Secure Than Windows? Does It Matter?
Commentary  |  3/30/2007  | 
Is the Mac more secure than Windows, in some absolute measurement of security? And does it really matter? Senior writer Sharon Gaudin talked to a few security experts and reported the consensus that, despite a recent increase in reported security flaws, the Mac is still more secure than Windows. But it's doubtful that'll change anybody's buying decisions -- Windows users know that their software has security pr
The TJX Haul: Largest Ever AND The Perfect Crime?
Commentary  |  3/30/2007  | 
The California Secretary of State web site gets to keep it's title as number one in the race to be the longest running data breach. It left three years of files exposing personal data up online, practically for the taking. But the TJX Companies take the cake when it comes to known harm. The company has the dubious distinction of having the largest ever number of stolen credit and debit cards - 45.7 million - whi
Could This Be The 'Longest-Running Internet Breach Ever'?
Commentary  |  3/23/2007  | 
That old saw, "We're from the government, and we're here to help you," could stand some updating in this digital life. How about this one: "We're from the government, and we're here to give your identity away -- no questions asked."
Spy Agency Posts Windows, OS X Security Guides
Commentary  |  3/19/2007  | 
Who should know more about security than the National Security Agency? (Hey, it's their middle name!) No one, presumably. Which is why you might want to check out a series of security configuration guides the NSA has posted for Windows XP, 2000, Mac OS X, and Sun Solaris.
Data Safety -- The Old Fashioned Way
Commentary  |  3/15/2007  | 
We can all breathe easier. WellPoint, the country's largest managed care firm, has found its missing disk -- the unencrypted one that contains the personal information (including Social Security numbers and medical records) of 75,000 people. It had been lost in transit by UPS. But they found it. Don't you feel better?
How Will You Spend Your Patch Tuesday?
Commentary  |  3/12/2007  | 
For the first time since September 2005, 30 days will come and go without what has become a monthly ritual across the IT landscape. Patch Tuesday's reliable stream of bulletins and patches has been silenced for the time being. Is this the equivalent of a snow day for IT security pros? Or are they too burnt out from dealing with Daylight Savings Time issues to even notice?
Got Time?
Commentary  |  3/2/2007  | 
That whole time-change thing that has everyone rolling their eyes -- you know, early daylight-saving time? OK, it's not Y2K. (What could be?) And as I noted in a recent column (which goes into this issue in greater detail), no one is talking disasters of biblical proportions. But there is a little more to this than the momentary irritation of missed appointments and calendars being off an hou


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35397
PUBLISHED: 2021-08-04
A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending...
CVE-2021-36483
PUBLISHED: 2021-08-04
DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization.
CVE-2021-37231
PUBLISHED: 2021-08-04
A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.
CVE-2021-37232
PUBLISHED: 2021-08-04
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
CVE-2021-32813
PUBLISHED: 2021-08-03
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however...