News & Commentary

Content tagged with Privacy posted in February 2016
The ROI Of Infosec: 11 Dos and Donts For Management Buy In
Commentary  |  2/27/2016  | 
The case for a bigger bottom line depends on how well you argue that the business cant run without a specific level of security infrastructure.
The Week In Justice: 3 Confessions, 2 Convictions & 2 Years For Two Hackers
News  |  2/24/2016  | 
Courts obtain convictions and guilty pleas from those involved with 'largest known' hacking and securities fraud scheme, online hacking forums, celebrity photo theft, and malicious insider destructive attacks.
FBI Vs. Apple: Privacy Syllabus
Slideshows  |  2/24/2016  | 
Some of the very best articles, blogs, and other opinions on the issue of government meddling in encryption technology.
Coalition Aims To Bridge Gap Between Government, Industry On Encryption
News  |  2/23/2016  | 
Digital Equilibrium Project says it will work to avert standoffs like the one between Apple and the FBI.
FAQ: Heres What You Need To Know About The Apple, FBI Dispute
News  |  2/23/2016  | 
The case marks a watershed moment in the debate over national security interests and privacy rights.
Today's New Payment Card Security In A Nutshell
Commentary  |  2/17/2016  | 
Businesses taking their time rolling out EMV card-compatible terminals are putting their data security and financial well-being at risk.
Cybersecurity & Healthcare: Does Cybersecurity Act Help or Hurt?
Commentary  |  2/12/2016  | 
Without adequate resources, the new Cybersecurity Act of 2015 Act is merely a snapshot in time that does little to safeguard sensitive medical information.
Congress Passes Judicial Redress Act, UK Snoopers' Charter Gets Closer Look
Quick Hits  |  2/11/2016  | 
European citizens win right to sue the Americans over privacy violations, while Britain ponders new ways to commit privacy violations.
Bipartisan House Bill Will Seek To Prevent States From Mandating Encryption Backdoors
Quick Hits  |  2/10/2016  | 
ENCRYPT Act aims to stave off efforts being made in California and New York legislatures.
Cybersecurity Smackdown: What Side Are You On?
Commentary  |  2/4/2016  | 
Analytics vs. Encryption. Prevention vs. Detection. Machine Learning: Promise or Hype? The Firewall: Dead or Still Breathing? The sharpest minds in the security industry debate some of the industry's most contentious issues.
EU, US Agree On New Data Transfer Pact, But Will It Hold?
News  |  2/2/2016  | 
So long Safe Harbor, hello 'Privacy Shield.'
Encryption Has Its Place But It Isnt Foolproof
Commentary  |  2/2/2016  | 
Most encrypted data is unencrypted at some point in its lifecycle -- and the bad guys are pretty good at finding the one window left open.
As Good As They're Getting, Analytics Don't Inherently Protect Data
Commentary  |  2/2/2016  | 
It is only a matter of time before your system is breached, and when your data is lost, analytics won't help you.


New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The one you have not seen, won't be remembered".
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10428
PUBLISHED: 2018-05-23
ILIAS before 5.1.26, 5.2.x before 5.2.15, and 5.3.x before 5.3.4, due to inconsistencies in parameter handling, is vulnerable to various instances of reflected cross-site-scripting.
CVE-2018-6495
PUBLISHED: 2018-05-23
Cross-Site Scripting (XSS) in Micro Focus Universal CMDB, version 10.20, 10.21, 10.22, 10.30, 10.31, 10.32, 10.33, 11.0, CMS, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1 and Micro Focus UCMDB Browser, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1. This vulnerability could be remotely exploited to al...
CVE-2018-10653
PUBLISHED: 2018-05-23
There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10654
PUBLISHED: 2018-05-23
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10648
PUBLISHED: 2018-05-23
There are Unauthenticated File Upload Vulnerabilities in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.