Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in March 2006
Check Point Made The Right Move In Dropping Sourcefire Bid
Commentary  |  3/30/2006  | 
The fastest way to obscurity in the security market is to worry about yesterday's problems. Check Point Software Technologies is looking to put its aborted bid to buy Sourcefire behind it. Once the deal came under the scrutiny of the Committee on Foreign Investment in the United States, both companies would have been wrapped up in red tape for months. Unacceptable in the fast-moving world of IT security.
When It Comes To Data, We Just Still Don't Get It
Commentary  |  3/30/2006  | 
This whole information mismanagement thing is really starting to concern me. If we're to draw conclusions from recent developments, we, the nation that has mastered the art of creating an information economy while shipping most of the actual production of real goods overseas, appear to have no idea what we're doing with electronic data.
Data Security: Out To Lunch, Er, Dinner
Commentary  |  3/27/2006  | 
It was just last week that InformationWeek published the latest exhaustive analysis of what's emerging as the IT story of the first decade of this century: complete corporate and government ineptitude when it comes to managing sensitive personal data.
Confessions Of An Adware Purveyor
Commentary  |  3/27/2006  | 
York Baur acknowledges that 180solutions' original approach to spreading adware among the Internet masses wasn't properly executed by the company. "Lots of criticisms have been levied against 180, but I think the only valid criticism was that we were perhaps naïve about the world of Web publishing earlier on in our history, and it has taken us through 2005 to truly take control of that ownership of that network and get practices that we think are poor cleaned up," says Baur, 180solutions' e
Finger-Pointing Abounds As Customers Are Fleeced
Commentary  |  3/21/2006  | 
In June, Frank Robertson could be sentenced to spend the next 15 years in a New Jersey state prison as punishment for his role in one of the biggest payment-card frauds pulled off to date. Robertson and 13 other men were arrested in December in connection with a heist that stretches across the U.S. and into Eastern Europe, with more than $3 million in goods stolen along the way, mostly high-end electronics. The repercussions of this crime will ripple throughout the financial services, retail, an
Securing A Solution To Data Theft
Commentary  |  3/20/2006  | 
One of the most popular stories on our site over the last two weeks was "PIN Scandal 'Worst Hack Ever'; Citibank Only The Start," followed closely by "International Citibank Customers Shaken By Data Breach." Day after day, one or both made our list of the five most popular headlines. I'm guessing another story posted Monday, about
The War On Malware Goes Mobile
Commentary  |  3/10/2006  | 
Remember the good old days, when your only concern about issuing and managing cell phones and PDAs was that someone would leave theirs in a taxi or on an airplane? Now viruses and mobile malware have reared their ugly heads, further convincing IT departments that BlackBerrys, cell phones, laptops, and PDAs must be locked down with as much vigor as back-end systems. The result is a slew of mobile data security options that include mobile encryption and even a kill switch for data should it fall i
If You Can't Trust Your Bank, Who Can You Trust?
Commentary  |  3/9/2006  | 
You're traveling out of the country, for business or on vacation, and you decide it's time for lunch. You're about to hail a taxi to take you to that fantastic café you passed by this morning, but first you figure you might was well get some cash. No problem, there's even a branch of your local bank nearby. Well, maybe there is a problem. The ATM refuses to give you any money, informing you that your transaction cannot be completed and you should call your bank. You pull out your cell phone
Rootkit Evangelist Holy_father Abandons His Mission
Commentary  |  3/7/2006  | 
His mission unfulfilled, Holy_father has nonetheless stopped offering his Hacker Defender rootkit anti-detection services. I blogged in January about Holy_father's calling, which, he says, is to challenge the IT security industry by providing hackers with rootkits that can be used to install malware


97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7088
PUBLISHED: 2019-05-23
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7096
PUBLISHED: 2019-05-23
Adobe Flash Player versions 32.0.0.156 and earlier, 32.0.0.156 and earlier, and 32.0.0.156 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2019-7098
PUBLISHED: 2019-05-23
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2019-7099
PUBLISHED: 2019-05-23
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2019-7100
PUBLISHED: 2019-05-23
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.