Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Commentary

Content posted in November 2006
E-Tailers Leaving Money On The Table Thanks To Weak Web Sites
Commentary  |  11/30/2006  | 
One week after I'd already bought three holiday presents online I learned that the vast majority of Web sites are vulnerable to attack by malicious hackers and that such security concerns are expected to drive away potential customers who would have shelled out nearly $2 billion online this year. The only real surprise is why those numbers aren't higher.
What Do You Have To Give Them If You Want To Use The Bathroom?
Commentary  |  11/30/2006  | 
An International House of Pancakes (IHOP) restaurant reversed its policy of requiring customers to surrender their driver's licenses before being served, after customers complained about the privacy and identity theft risks. One customer complained: "You want my license? I'm going for pancakes, I'm not buying the Hope diamond." The restaurant was trying to limit "dine-a
The Ripple Effects Of E-Discovery
Commentary  |  11/29/2006  | 
When I last tread this space, it was to alert readers who weren't already aware, of the Dec. 1rst launch of new federal rules regarding electronic discovery. By the way, there's no new law. The new requirements are just an extension of existing rules, which you can find here.
To Improve Holiday Safety, I'll Start A House Fire Every Day In December Using A Different Christmas Decoration
Commentary  |  11/22/2006  | 
The gimmick of churning out software security flaws on a daily basis for some set period has gotten ridiculous. First the Month of Browser Bugs, then the Month of Kernel Bugs, now the research firm firm Argeniss plans the Week of Oracle Database Bugs. Security researchers play an irreplaceable watchdog role. But it's time to retire this publicity stunt.
Making A List And Checking It Twice
Commentary  |  11/21/2006  | 
Thanksgiving on the doorstep means December is just around the corner, bringing with it expressions of cheery good will to all buttressed by those endless, frantic holiday to-do lists. This year, though, before turning out the lights to hit the company party, IT is going to have to check off one more item, and it's a doozy.
Secure U.K. Passport Cracked
Commentary  |  11/17/2006  | 
Two British security experts were able to read encrypted data off a supposedly highly secure U.K. RFID-equipped passport using equipment priced under £250, according to the Guardian..

But is that an impressive hack? The UK government thinks not:

Technology Makes Fraud Trivially Easy
Commentary  |  11/14/2006  | 
Identity theft expert Frank Abagnale describes how technology has made fraud trivially easy:

Abagnale was subject of the 2002 Steven Spielberg movie Catch Me If You Can, starring Leonardo DiCaprio, which depicted his exploits as a teenager in the 60s, posing as an airline pilot to live the glamorous life of a jet-setter around the world, until he was caught.

Best Practices In Smartphone Security
Commentary  |  11/3/2006  | 
Many of you are thinking about giving your employees access to business applications on smartphones. Yet over 60% of you feel your company's smartphones are somewhat secure and that your policies and safeguards need improvement. Security risks will always exist, but there are steps you can take to mitigate them. I thought I'd help by outlining best practices for smartphone security in a list, court
The Surveillance Society: It's Closing In!
Commentary  |  11/2/2006  | 
Sorry 4 typos but I know they're watching--always suspected it but just got confirmation from Reuters news story saying US and UK r as oppressive as China and Russia in terms of spying on citizens--I hear footsteps and know they're coming for me cause I'm speaking out!!


Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.