Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Mobile posted in March 2015
Hotel Router Vulnerability A Reminder Of Untrusted WiFi Risks
News  |  3/27/2015  | 
A flaw in a popular router product may have exposed millions of hotel guests, researchers from Cylance say.
The Internet Of Bring-Your-Own Things
Commentary  |  3/25/2015  | 
Devices and interconnected systems are finding a foothold not only in our homes but in mainstream organizations. Here are three tips to mitigate the risk.
New Secure Online Check-Out Tech Goes For Less Friction, More Biometrics
News  |  3/24/2015  | 
BioCatch, Zumigo, and Alibaba release tools to help merchants avoid those pesky charge-back costs.
Rush To Release Resulting In Vulnerable Mobile Apps
News  |  3/20/2015  | 
IT organizations overlooking security in their haste to crank out mobile apps, Ponemon Institute report finds.
BlackBerry Looks To Revive Relevance By Doubling Down On Security
News  |  3/17/2015  | 
Company launches new uber-secure tablet built on Samsung hardware, teams with IBM.
Most Companies Expect To Be Hacked In The Next 12 Months
News  |  3/16/2015  | 
Security spending increases, while confidence in stopping cyber attacks decreases, new report shows.
Yahoo's One-Time Passwords Have Security Experts Divided
News  |  3/16/2015  | 
Better protection from keyloggers, but you'd better not lose your phone, Yahoo users.
Study: Enterprises Losing Faith In Digital Certificates, Crytographic Keys
News  |  3/12/2015  | 
On the heels of Heartbleed and other vulnerabilities, many enterprises are not confident in the ability of digital certificates to protect their data, Ponemon report says
DroppedIn Vuln Links Victims' Androids To Attackers' DropBoxes
News  |  3/11/2015  | 
DropBox released a patch quick, but unpatched vulnerable Android apps that use the DropBox SDK may let attackers open up a two-way highway between victim Droids and their own Boxes.
Apple Pay Fraud Gives Us A New Reason To Hate Data Breaches And SSNs
News  |  3/4/2015  | 
There may already be millions of dollars in losses, but you can't blame Apple for this one.
A Building Code For Internet of Things Security, Privacy
Commentary  |  3/4/2015  | 
In the fast-emerging IoT, medical device safety is reaching a critical juncture. Here are three challenges InfoSec professionals should begin to think about now.
Mobile Security By The Numbers
Slideshows  |  3/2/2015  | 
Rounding up the latest research on mobile malware and security practices.


How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3318
PUBLISHED: 2021-01-27
attach/ajax.php in DzzOffice through 2.02.1 allows XSS via the editorid parameter.
CVE-2020-5427
PUBLISHED: 2021-01-27
In Spring Cloud Data Flow, versions 2.6.x prior to 2.6.5, versions 2.5.x prior 2.5.4, an application is vulnerable to SQL injection when requesting task execution.
CVE-2020-5428
PUBLISHED: 2021-01-27
In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer.
CVE-2021-20357
PUBLISHED: 2021-01-27
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 194963.
CVE-2020-4865
PUBLISHED: 2021-01-27
IBM Jazz Foundation products is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190741.