Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Commentary

Content posted in February 2008
<<   <   Page 2 / 2
Europe: For All Your Spam Needs
Commentary  |  2/6/2008  | 
Europe has been taking the lead in several areas of technology lately. The European Space Agency (ESA) will be the first to send an unmanned cargo ship to the international space station. London will be Europe's first city to get A380 Airbus service. Now Europe claims another 'accolade' -- Symantec sa
National Intelligence Director: Cyber Risks Rising
Commentary  |  2/6/2008  | 
The news provided by the director of national intelligence, Mike McConnell, to a Senate panel yesterday wasn't all good. While Al-Qaida is weakening in Iraq, it's spreading its tentacles elsewhere. That includes the critical IT infrastructure. Part of his testimony included warnings that the threat of cyberattacks are increasing from terror groups, homegrown militants, and nations.
Remote Worker Worries: On The Road With Their Guards Down
Commentary  |  2/6/2008  | 
A couple of items recently caught by the bMighty ANTenna ought to have your own security antennae twitching at full alert. The combination of remote workers and more powerful mobile devices could be setting up a perfect storm of security woes.
Electronic Voting Systems Go Unattended
Commentary  |  2/5/2008  | 
It's been nearly eight years since the 2000 election fiasco, and it seems with every election, the complaints of failing voting systems only seem to mount.
Just in Time For 'Hannah Montana'
Commentary  |  2/5/2008  | 
I'm not a reflexive technophobe or a Chomsky-quoting art school washout (more of a Sam Kinison plagiarist here, minus the beret). But it still beats the pants off me why anybody would want to watch a movie on a device smaller than a laptop. My inability to comprehend isn't stopping Apple from adding memory to its consumer goo
Internet Voting: Bad Or Good Idea?
Commentary  |  2/5/2008  | 
It's Super Tuesday, perhaps the most critical day for the presidential election until the general elections this fall. And some voters abroad will have the option to cast their ballot online. That's online, as in over the Internet. Are we really ready for this?
Dell Looks To iSCSI To Restore Former Luster
Commentary  |  2/4/2008  | 
The merger of Dell's manufacturing know-how and EqualLogic's innovation were supposed to result in all sorts of storage goodies when Dell acquired the company late last year. Now, if the combined assets could just fix the rest of what's ailing Dell.
New Botnet Army On The March
Commentary  |  2/4/2008  | 
There's a new botnet (a network of malicious nodes, known as "bots") gaining strength, and it's successfully infiltrating U.S. companies by bypassing traditional antivirus products.
Microsoft, Yahoo, And OpenID
Commentary  |  2/4/2008  | 
Now that it seems highly likely that Microsoft will acquire Yahoo (unless News Corp., or even Apple, start a bidding war), what will the impact be on OpenID -- if any?
Super Bowl. Robo Security.
Commentary  |  2/2/2008  | 
While the Department of Homeland Security says there are no specific terror threats regarding Super Bowl XLII, security is being taken seriously at the game, where the New England Patriots will face off against the New York Giants.
Economy To Test Storage Vendors' Durability
Commentary  |  2/1/2008  | 
Is the U.S. economy in a recession? With the Fed cutting interest rates like a tailor on speed, a streaky stock market, and no good news on the employment front, it's safe to say we're at least hip-deep in a contracting economy. And decent financial results from EMC, HP, and others have led some to conclude storage is recession-proof. That may be tr
Forget Terrorists. Watch Out For Backhoes
Commentary  |  2/1/2008  | 
Terrorists may represent some danger to power plants, but human carelessness is far more likely to damage critical infrastructure. Given the events of the past few days, it's hard to believe that al-Qaida would even bother plotting to take down the Internet or a power station when everyday bumbling does the job for them.
Click Fraud Continues Climb
Commentary  |  2/1/2008  | 
Are you paying for clicks? Then you should be aware that last year's growth in fake clicks (that advertisers still have to pay for) set a scary 15 percent pace.
Web 2.0 Security, Microsoft, And Yahoo
Commentary  |  2/1/2008  | 
People always seem to talk about how important application security is to them. But rarely do we --as consumers of technology -- have a chance to have a profound impact on the quality and security of software applications and services. But with Microsoft's pending acquisition of Yahoo, a new opportunity arises.
Lessons Learned from SocGen: Every Employee Matters
Commentary  |  2/1/2008  | 
By now nearly everyone has heard about the rogue trader at SocGen, one of France's largest banks, who managed to cause the bank to lose an astonishing $7.2 billion. But as the details of the case emerge, the lessons learned from the incident apply to all businesses, even smaller ones.
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.