Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Commentary

Content posted in February 2008
<<   <   Page 2 / 2
Europe: For All Your Spam Needs
Commentary  |  2/6/2008  | 
Europe has been taking the lead in several areas of technology lately. The European Space Agency (ESA) will be the first to send an unmanned cargo ship to the international space station. London will be Europe's first city to get A380 Airbus service. Now Europe claims another 'accolade' -- Symantec sa
National Intelligence Director: Cyber Risks Rising
Commentary  |  2/6/2008  | 
The news provided by the director of national intelligence, Mike McConnell, to a Senate panel yesterday wasn't all good. While Al-Qaida is weakening in Iraq, it's spreading its tentacles elsewhere. That includes the critical IT infrastructure. Part of his testimony included warnings that the threat of cyberattacks are increasing from terror groups, homegrown militants, and nations.
Remote Worker Worries: On The Road With Their Guards Down
Commentary  |  2/6/2008  | 
A couple of items recently caught by the bMighty ANTenna ought to have your own security antennae twitching at full alert. The combination of remote workers and more powerful mobile devices could be setting up a perfect storm of security woes.
Electronic Voting Systems Go Unattended
Commentary  |  2/5/2008  | 
It's been nearly eight years since the 2000 election fiasco, and it seems with every election, the complaints of failing voting systems only seem to mount.
Just in Time For 'Hannah Montana'
Commentary  |  2/5/2008  | 
I'm not a reflexive technophobe or a Chomsky-quoting art school washout (more of a Sam Kinison plagiarist here, minus the beret). But it still beats the pants off me why anybody would want to watch a movie on a device smaller than a laptop. My inability to comprehend isn't stopping Apple from adding memory to its consumer goo
Internet Voting: Bad Or Good Idea?
Commentary  |  2/5/2008  | 
It's Super Tuesday, perhaps the most critical day for the presidential election until the general elections this fall. And some voters abroad will have the option to cast their ballot online. That's online, as in over the Internet. Are we really ready for this?
Dell Looks To iSCSI To Restore Former Luster
Commentary  |  2/4/2008  | 
The merger of Dell's manufacturing know-how and EqualLogic's innovation were supposed to result in all sorts of storage goodies when Dell acquired the company late last year. Now, if the combined assets could just fix the rest of what's ailing Dell.
New Botnet Army On The March
Commentary  |  2/4/2008  | 
There's a new botnet (a network of malicious nodes, known as "bots") gaining strength, and it's successfully infiltrating U.S. companies by bypassing traditional antivirus products.
Microsoft, Yahoo, And OpenID
Commentary  |  2/4/2008  | 
Now that it seems highly likely that Microsoft will acquire Yahoo (unless News Corp., or even Apple, start a bidding war), what will the impact be on OpenID -- if any?
Super Bowl. Robo Security.
Commentary  |  2/2/2008  | 
While the Department of Homeland Security says there are no specific terror threats regarding Super Bowl XLII, security is being taken seriously at the game, where the New England Patriots will face off against the New York Giants.
Economy To Test Storage Vendors' Durability
Commentary  |  2/1/2008  | 
Is the U.S. economy in a recession? With the Fed cutting interest rates like a tailor on speed, a streaky stock market, and no good news on the employment front, it's safe to say we're at least hip-deep in a contracting economy. And decent financial results from EMC, HP, and others have led some to conclude storage is recession-proof. That may be tr
Forget Terrorists. Watch Out For Backhoes
Commentary  |  2/1/2008  | 
Terrorists may represent some danger to power plants, but human carelessness is far more likely to damage critical infrastructure. Given the events of the past few days, it's hard to believe that al-Qaida would even bother plotting to take down the Internet or a power station when everyday bumbling does the job for them.
Click Fraud Continues Climb
Commentary  |  2/1/2008  | 
Are you paying for clicks? Then you should be aware that last year's growth in fake clicks (that advertisers still have to pay for) set a scary 15 percent pace.
Web 2.0 Security, Microsoft, And Yahoo
Commentary  |  2/1/2008  | 
People always seem to talk about how important application security is to them. But rarely do we --as consumers of technology -- have a chance to have a profound impact on the quality and security of software applications and services. But with Microsoft's pending acquisition of Yahoo, a new opportunity arises.
Lessons Learned from SocGen: Every Employee Matters
Commentary  |  2/1/2008  | 
By now nearly everyone has heard about the rogue trader at SocGen, one of France's largest banks, who managed to cause the bank to lose an astonishing $7.2 billion. But as the details of the case emerge, the lessons learned from the incident apply to all businesses, even smaller ones.
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41872
PUBLISHED: 2021-10-27
Skyworth Digital Technology Penguin Aurora Box 41502 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
CVE-2021-34580
PUBLISHED: 2021-10-27
In mymbCONNECT24, mbCONNECT24 &lt;= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts.
CVE-2011-4126
PUBLISHED: 2021-10-27
Race condition issues were found in Calibre at devices/linux_mount_helper.c allowing unprivileged users the ability to mount any device to anywhere.
CVE-2011-4574
PUBLISHED: 2021-10-27
PolarSSL versions prior to v1.1 use the HAVEGE random number generation algorithm. At its heart, this uses timing information based on the processor's high resolution timer (the RDTSC instruction). This instruction can be virtualized, and some virtual machine hosts have chosen to disable this instru...
CVE-2020-7867
PUBLISHED: 2021-10-27
An improper input validation vulnerability in Helpu solution could allow a local attacker to arbitrary file creation and execution without click file transfer menu. It is possible to file in arbitrary directory for user because the viewer program receive the file from agent with privilege of adminis...