News & Commentary

Content tagged with Database Security posted in February 2012
Why BYOD Doesn't Always Work In Healthcare
Commentary  |  2/28/2012  | 
Security and screen layout problems make it difficult to let clinicians bring their own tablets and smartphones to work.
Strengthening Third-Party Contracts To Lower Breach Risks
News  |  2/22/2012  | 
FTC breach, contract deficiencies highlight importance of including security provisions within technology contracts
Can You Delete A Database?
Commentary  |  2/22/2012  | 
Data and databases keep growing, but there's a security tradeoff
Bad Password Management Exposes Critical Databases
News  |  2/15/2012  | 
Nortel breach shows how poor password management can give away keys to the kingdom
The Financial Industry's Effect On Database Security
Commentary  |  2/15/2012  | 
Security requirements for the financial-services industry differ from other industries
Health Data Breaches Up 97% in 2011
News  |  2/13/2012  | 
Redspin report calls for tougher HIPAA standards, regular security audits, and more employee education.
TigerText Investment To Tighten Up Messaging Security
News  |  2/9/2012  | 
As text messaging among healthcare providers increases, TigerText secures $8.2 million to improve security.
CJIS Rules Not Impossible To Comply With, But It'll Cost Ya
News  |  2/8/2012  | 
Database security and encryption pros say requirements are not unreasonable
A Response To NoSQL Security Concerns
Commentary  |  2/6/2012  | 
Three key takeaways from a recent webcast about database security in the NoSQL database movement
Poisoning The Data Well
News  |  2/1/2012  | 
A Q&A with Forrester's John Kindervag about how encryption makes data worthless to the criminals


Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-9541
PUBLISHED: 2018-11-14
In avrc_pars_vendor_rsp of avcr_pars_ct.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Androi...
CVE-2018-9542
PUBLISHED: 2018-11-14
In avrc_pars_vendor_rsp of avrc_pars_ct.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 ...
CVE-2018-9543
PUBLISHED: 2018-11-14
In f2fs_format_utils.c WITH_BLKDISCARD is not defined, which may cause the data partition to not be wiped at factory reset, leading to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. ...
CVE-2018-9544
PUBLISHED: 2018-11-14
In register_app of btif_hd.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: A...
CVE-2018-9545
PUBLISHED: 2018-11-14
In BTA_HdRegisterApp of bta_hd_api.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Androi...