Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Commentary

Content posted in February 2008
<<   <   Page 2 / 2
Europe: For All Your Spam Needs
Commentary  |  2/6/2008  | 
Europe has been taking the lead in several areas of technology lately. The European Space Agency (ESA) will be the first to send an unmanned cargo ship to the international space station. London will be Europe's first city to get A380 Airbus service. Now Europe claims another 'accolade' -- Symantec sa
National Intelligence Director: Cyber Risks Rising
Commentary  |  2/6/2008  | 
The news provided by the director of national intelligence, Mike McConnell, to a Senate panel yesterday wasn't all good. While Al-Qaida is weakening in Iraq, it's spreading its tentacles elsewhere. That includes the critical IT infrastructure. Part of his testimony included warnings that the threat of cyberattacks are increasing from terror groups, homegrown militants, and nations.
Remote Worker Worries: On The Road With Their Guards Down
Commentary  |  2/6/2008  | 
A couple of items recently caught by the bMighty ANTenna ought to have your own security antennae twitching at full alert. The combination of remote workers and more powerful mobile devices could be setting up a perfect storm of security woes.
Electronic Voting Systems Go Unattended
Commentary  |  2/5/2008  | 
It's been nearly eight years since the 2000 election fiasco, and it seems with every election, the complaints of failing voting systems only seem to mount.
Just in Time For 'Hannah Montana'
Commentary  |  2/5/2008  | 
I'm not a reflexive technophobe or a Chomsky-quoting art school washout (more of a Sam Kinison plagiarist here, minus the beret). But it still beats the pants off me why anybody would want to watch a movie on a device smaller than a laptop. My inability to comprehend isn't stopping Apple from adding memory to its consumer goo
Internet Voting: Bad Or Good Idea?
Commentary  |  2/5/2008  | 
It's Super Tuesday, perhaps the most critical day for the presidential election until the general elections this fall. And some voters abroad will have the option to cast their ballot online. That's online, as in over the Internet. Are we really ready for this?
Dell Looks To iSCSI To Restore Former Luster
Commentary  |  2/4/2008  | 
The merger of Dell's manufacturing know-how and EqualLogic's innovation were supposed to result in all sorts of storage goodies when Dell acquired the company late last year. Now, if the combined assets could just fix the rest of what's ailing Dell.
New Botnet Army On The March
Commentary  |  2/4/2008  | 
There's a new botnet (a network of malicious nodes, known as "bots") gaining strength, and it's successfully infiltrating U.S. companies by bypassing traditional antivirus products.
Microsoft, Yahoo, And OpenID
Commentary  |  2/4/2008  | 
Now that it seems highly likely that Microsoft will acquire Yahoo (unless News Corp., or even Apple, start a bidding war), what will the impact be on OpenID -- if any?
Super Bowl. Robo Security.
Commentary  |  2/2/2008  | 
While the Department of Homeland Security says there are no specific terror threats regarding Super Bowl XLII, security is being taken seriously at the game, where the New England Patriots will face off against the New York Giants.
Economy To Test Storage Vendors' Durability
Commentary  |  2/1/2008  | 
Is the U.S. economy in a recession? With the Fed cutting interest rates like a tailor on speed, a streaky stock market, and no good news on the employment front, it's safe to say we're at least hip-deep in a contracting economy. And decent financial results from EMC, HP, and others have led some to conclude storage is recession-proof. That may be tr
Forget Terrorists. Watch Out For Backhoes
Commentary  |  2/1/2008  | 
Terrorists may represent some danger to power plants, but human carelessness is far more likely to damage critical infrastructure. Given the events of the past few days, it's hard to believe that al-Qaida would even bother plotting to take down the Internet or a power station when everyday bumbling does the job for them.
Click Fraud Continues Climb
Commentary  |  2/1/2008  | 
Are you paying for clicks? Then you should be aware that last year's growth in fake clicks (that advertisers still have to pay for) set a scary 15 percent pace.
Web 2.0 Security, Microsoft, And Yahoo
Commentary  |  2/1/2008  | 
People always seem to talk about how important application security is to them. But rarely do we --as consumers of technology -- have a chance to have a profound impact on the quality and security of software applications and services. But with Microsoft's pending acquisition of Yahoo, a new opportunity arises.
Lessons Learned from SocGen: Every Employee Matters
Commentary  |  2/1/2008  | 
By now nearly everyone has heard about the rogue trader at SocGen, one of France's largest banks, who managed to cause the bank to lose an astonishing $7.2 billion. But as the details of the case emerge, the lessons learned from the incident apply to all businesses, even smaller ones.
<<   <   Page 2 / 2


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19040
PUBLISHED: 2019-11-17
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '&quot;sampling&quot;:{&quot;value&quot;:&quot;&lt;script&gt;' substring.
CVE-2019-19041
PUBLISHED: 2019-11-17
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by th...
CVE-2019-19012
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
CVE-2019-19022
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
CVE-2019-19035
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.