Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Cloud posted in November 2011
Major Email Providers Set Phish Trap
News  |  11/30/2011  | 
Agari's Email Trust Fabric finds fans at AOL, Google, Microsoft, and Yahoo. The goal: Stop spoofing of legitimate email domains.
Healthcare Breach Exposes Nearly 4 Million Patients' Data
News  |  11/18/2011  | 
California healthcare organization was in the midst of an encryption rollout when unencrypted machine with patent databases was stolen.
Verizon Uses Predictive Modeling To Detect Health Fraud
News  |  11/16/2011  | 
Verizon software can spot doctors prescribing excessive amounts of medication and other trends that indicate falsified billings.
Patients Have Security Concerns On Data Sharing
News  |  11/16/2011  | 
New report by PwC reveals what consumers think about data sharing, privacy and security, online consultations, social media in healthcare, and more.
Data Mining Snares Health Insurance Fraud
News  |  11/14/2011  | 
LexisNexis applies predictive modeling, a massive database, and high-performance computing cluster technology to spot health insurance fraud before claims are paid.
Encryption Security Lags In Healthcare?
News  |  11/14/2011  | 
Tech leaders warn policymakers that even as more electronic health records flood health IT systems, more encryption is needed.
Public Cloud Security Credentials Flunk A Research Test
News  |  11/10/2011  | 
Researchers who grabbed security credentials via Google code search advise caution regarding sensitive data and public cloud services.
Docs Warm Up to EHRs, Patients Want Paper
Commentary  |  11/3/2011  | 
While docs are gradually getting onboard with electronic health records, most patients worry about the security of their personal health info in cyberspace. What's behind the chasm?
Cloud Security Doubted By Most IT Executives
News  |  11/3/2011  | 
Two-thirds of IT pros don't believe they can secure cloud infrastructure as well as on-premises environments, research says.


7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5521
PUBLISHED: 2020-01-27
The kantan netprint App for iOS 2.0.2 and earlier does not verify X.509 certificates from servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
CVE-2020-5522
PUBLISHED: 2020-01-27
The kantan netprint App for Android 2.0.3 and earlier does not verify X.509 certificates from servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
CVE-2017-14806
PUBLISHED: 2020-01-27
A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections. This issue affects: SUSE Studio onsite susestudio-common version 1.3....
CVE-2017-14807
PUBLISHED: 2020-01-27
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in susestudio-ui-server of SUSE Studio onsite allows remote attackers with admin privileges in Studio to alter SQL statements, allowing for extraction and modification of data. This issue affects: S...
CVE-2019-6036
PUBLISHED: 2020-01-27
Cross-site scripting vulnerability in F-RevoCRM 6.0 to F-RevoCRM 6.5 patch6 (version 6 series) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.