Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Commentary

Content posted in February 2008
<<   <   Page 2 / 2
Europe: For All Your Spam Needs
Commentary  |  2/6/2008  | 
Europe has been taking the lead in several areas of technology lately. The European Space Agency (ESA) will be the first to send an unmanned cargo ship to the international space station. London will be Europe's first city to get A380 Airbus service. Now Europe claims another 'accolade' -- Symantec sa
National Intelligence Director: Cyber Risks Rising
Commentary  |  2/6/2008  | 
The news provided by the director of national intelligence, Mike McConnell, to a Senate panel yesterday wasn't all good. While Al-Qaida is weakening in Iraq, it's spreading its tentacles elsewhere. That includes the critical IT infrastructure. Part of his testimony included warnings that the threat of cyberattacks are increasing from terror groups, homegrown militants, and nations.
Remote Worker Worries: On The Road With Their Guards Down
Commentary  |  2/6/2008  | 
A couple of items recently caught by the bMighty ANTenna ought to have your own security antennae twitching at full alert. The combination of remote workers and more powerful mobile devices could be setting up a perfect storm of security woes.
Electronic Voting Systems Go Unattended
Commentary  |  2/5/2008  | 
It's been nearly eight years since the 2000 election fiasco, and it seems with every election, the complaints of failing voting systems only seem to mount.
Just in Time For 'Hannah Montana'
Commentary  |  2/5/2008  | 
I'm not a reflexive technophobe or a Chomsky-quoting art school washout (more of a Sam Kinison plagiarist here, minus the beret). But it still beats the pants off me why anybody would want to watch a movie on a device smaller than a laptop. My inability to comprehend isn't stopping Apple from adding memory to its consumer goo
Internet Voting: Bad Or Good Idea?
Commentary  |  2/5/2008  | 
It's Super Tuesday, perhaps the most critical day for the presidential election until the general elections this fall. And some voters abroad will have the option to cast their ballot online. That's online, as in over the Internet. Are we really ready for this?
Dell Looks To iSCSI To Restore Former Luster
Commentary  |  2/4/2008  | 
The merger of Dell's manufacturing know-how and EqualLogic's innovation were supposed to result in all sorts of storage goodies when Dell acquired the company late last year. Now, if the combined assets could just fix the rest of what's ailing Dell.
New Botnet Army On The March
Commentary  |  2/4/2008  | 
There's a new botnet (a network of malicious nodes, known as "bots") gaining strength, and it's successfully infiltrating U.S. companies by bypassing traditional antivirus products.
Microsoft, Yahoo, And OpenID
Commentary  |  2/4/2008  | 
Now that it seems highly likely that Microsoft will acquire Yahoo (unless News Corp., or even Apple, start a bidding war), what will the impact be on OpenID -- if any?
Super Bowl. Robo Security.
Commentary  |  2/2/2008  | 
While the Department of Homeland Security says there are no specific terror threats regarding Super Bowl XLII, security is being taken seriously at the game, where the New England Patriots will face off against the New York Giants.
Economy To Test Storage Vendors' Durability
Commentary  |  2/1/2008  | 
Is the U.S. economy in a recession? With the Fed cutting interest rates like a tailor on speed, a streaky stock market, and no good news on the employment front, it's safe to say we're at least hip-deep in a contracting economy. And decent financial results from EMC, HP, and others have led some to conclude storage is recession-proof. That may be tr
Forget Terrorists. Watch Out For Backhoes
Commentary  |  2/1/2008  | 
Terrorists may represent some danger to power plants, but human carelessness is far more likely to damage critical infrastructure. Given the events of the past few days, it's hard to believe that al-Qaida would even bother plotting to take down the Internet or a power station when everyday bumbling does the job for them.
Click Fraud Continues Climb
Commentary  |  2/1/2008  | 
Are you paying for clicks? Then you should be aware that last year's growth in fake clicks (that advertisers still have to pay for) set a scary 15 percent pace.
Web 2.0 Security, Microsoft, And Yahoo
Commentary  |  2/1/2008  | 
People always seem to talk about how important application security is to them. But rarely do we --as consumers of technology -- have a chance to have a profound impact on the quality and security of software applications and services. But with Microsoft's pending acquisition of Yahoo, a new opportunity arises.
Lessons Learned from SocGen: Every Employee Matters
Commentary  |  2/1/2008  | 
By now nearly everyone has heard about the rogue trader at SocGen, one of France's largest banks, who managed to cause the bank to lose an astonishing $7.2 billion. But as the details of the case emerge, the lessons learned from the incident apply to all businesses, even smaller ones.
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the &acirc;&euro;&tilde;pec_coupon[code]&acirc;&euro;&trade; parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&amp;date_from=2023-02-17&amp;date_to=2023-03-17 of the component Report Handler. The manipula...