Commentary

Content posted in January 2007
YouTube Simpsons Subpoena Spotlights Copyright Insanity
Commentary  |  1/26/2007  | 
No, this isn't another legal tussle or media mess involving O.J. or Judith Regan. It's a Web copyright battle touched off by that overrated weekly animated series starring Homer and Marge. And, as with most copyright disputes, the online data path leads directly to YouTube.
HP Spy Charges Put PC Hacking In Perspective
Commentary  |  1/25/2007  | 
Thoughts of security breaches typically focus on hacking, but that stuff is small potatoes when compared to the big kahuna of unauthorized access: corporate spying.
The Wily 9-Year-Old Who 'Hacked' Airport Security
Commentary  |  1/22/2007  | 
They say social engineering is the most potent form of hacking, and now we have a 9-year-old who's proved it.
5 Free Security Betas You Can Download For Windows Vista
Commentary  |  1/21/2007  | 
Given the torrent of criticism Microsoft has taken for Windows Vista's inelegant User Account Controls (UACs), one couldn't be blamed for assuming that the operating system is handicapped when it comes to security. But one would be wrong, very wrong.
If You Like Needles, You're Gonna Love RFID
Commentary  |  1/19/2007  | 
Some recent news about electronic tracking of cattle, as well as a look at the new James Bond movie, has revived long-repressed fears about vaccinations at the pediatrician.
Trust: It's A Terrible Thing To Waste
Commentary  |  1/18/2007  | 
Kill me now. The latest data hack at the TJX companies has me, and a lot of other people I know, on the edge of their seats. We shop a lot at the TJX family of companies -- T.J. Maxx, Marshalls, HomeGoods, and A.J. Wright and Bob's Stores -- and yesterday's announcement that the company had been hit hard by a data hack is not sitting well.
Phishers And Rootkits And Death Threats, Oh My!
Commentary  |  1/18/2007  | 
I fell for a phisher last week. Embarrassing, but true. Until then, the urgent e-mails telling me that an account had been compromised had only managed to give me slight shivers of concern before my rational self took over and I clicked the delete button. Not this time.
New Security Threats For VoIP
Commentary  |  1/5/2007  | 
Panda Software looks at some scary security threats posed by VoIP. The top part of the article in IT-Observer looks at new ways that VoIP might be used for denial-of-service attacks, but the author, Fernando de la Cuadra, dismisses those threats as unlikely (too quickly, I think). The article then goes on to deal with possible threats posed by social engineering.



Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6487
PUBLISHED: 2019-01-18
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
CVE-2018-20735
PUBLISHED: 2019-01-17
** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
CVE-2019-0624
PUBLISHED: 2019-01-17
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0646
PUBLISHED: 2019-01-17
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0647
PUBLISHED: 2019-01-17
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.