Commentary

Content posted in March 2006
Check Point Made The Right Move In Dropping Sourcefire Bid
Commentary  |  3/30/2006  | 
The fastest way to obscurity in the security market is to worry about yesterday's problems. Check Point Software Technologies is looking to put its aborted bid to buy Sourcefire behind it. Once the deal came under the scrutiny of the Committee on Foreign Investment in the United States, both companies would have been wrapped up in red tape for months. Unacceptable in the fast-moving world of IT security.
When It Comes To Data, We Just Still Don't Get It
Commentary  |  3/30/2006  | 
This whole information mismanagement thing is really starting to concern me. If we're to draw conclusions from recent developments, we, the nation that has mastered the art of creating an information economy while shipping most of the actual production of real goods overseas, appear to have no idea what we're doing with electronic data.
Data Security: Out To Lunch, Er, Dinner
Commentary  |  3/27/2006  | 
It was just last week that InformationWeek published the latest exhaustive analysis of what's emerging as the IT story of the first decade of this century: complete corporate and government ineptitude when it comes to managing sensitive personal data.
Confessions Of An Adware Purveyor
Commentary  |  3/27/2006  | 
York Baur acknowledges that 180solutions' original approach to spreading adware among the Internet masses wasn't properly executed by the company. "Lots of criticisms have been levied against 180, but I think the only valid criticism was that we were perhaps naïve about the world of Web publishing earlier on in our history, and it has taken us through 2005 to truly take control of that ownership of that network and get practices that we think are poor cleaned up," says Baur, 180solutions' e
Finger-Pointing Abounds As Customers Are Fleeced
Commentary  |  3/21/2006  | 
In June, Frank Robertson could be sentenced to spend the next 15 years in a New Jersey state prison as punishment for his role in one of the biggest payment-card frauds pulled off to date. Robertson and 13 other men were arrested in December in connection with a heist that stretches across the U.S. and into Eastern Europe, with more than $3 million in goods stolen along the way, mostly high-end electronics. The repercussions of this crime will ripple throughout the financial services, retail, an
Securing A Solution To Data Theft
Commentary  |  3/20/2006  | 
One of the most popular stories on our site over the last two weeks was "PIN Scandal 'Worst Hack Ever'; Citibank Only The Start," followed closely by "International Citibank Customers Shaken By Data Breach." Day after day, one or both made our list of the five most popular headlines. I'm guessing another story posted Monday, about
The War On Malware Goes Mobile
Commentary  |  3/10/2006  | 
Remember the good old days, when your only concern about issuing and managing cell phones and PDAs was that someone would leave theirs in a taxi or on an airplane? Now viruses and mobile malware have reared their ugly heads, further convincing IT departments that BlackBerrys, cell phones, laptops, and PDAs must be locked down with as much vigor as back-end systems. The result is a slew of mobile data security options that include mobile encryption and even a kill switch for data should it fall i
If You Can't Trust Your Bank, Who Can You Trust?
Commentary  |  3/9/2006  | 
You're traveling out of the country, for business or on vacation, and you decide it's time for lunch. You're about to hail a taxi to take you to that fantastic café you passed by this morning, but first you figure you might was well get some cash. No problem, there's even a branch of your local bank nearby. Well, maybe there is a problem. The ATM refuses to give you any money, informing you that your transaction cannot be completed and you should call your bank. You pull out your cell phone
Rootkit Evangelist Holy_father Abandons His Mission
Commentary  |  3/7/2006  | 
His mission unfulfilled, Holy_father has nonetheless stopped offering his Hacker Defender rootkit anti-detection services. I blogged in January about Holy_father's calling, which, he says, is to challenge the IT security industry by providing hackers with rootkits that can be used to install malware


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6487
PUBLISHED: 2019-01-18
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
CVE-2018-20735
PUBLISHED: 2019-01-17
** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
CVE-2019-0624
PUBLISHED: 2019-01-17
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0646
PUBLISHED: 2019-01-17
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0647
PUBLISHED: 2019-01-17
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.