Dark Reading Article Boards

Message Boards posted in January 2018
Page 1 / 2   >   >>
5 Questions to Ask about Machine Learning
Last Message: 1/31/2018
 |  Comments: 1
Thieves Target ATMs In First US 'Jackpotting' Attacks
Last Message: 1/30/2018
 |  Comments: 1
10 Costs Your Cyber Insurance Policy May Not Cover
Last Message: 1/29/2018
 |  Comments: 6
Most Office 365 Admins Rely on Recycle Bin for Data Backup
Last Message: 1/29/2018
 |  Comments: 7
Ransomware Detections Up 90% for Businesses in 2017
Last Message: 1/28/2018
 |  Comments: 2
Facebook Buys Identity Verification Firm
Last Message: 1/27/2018
 |  Comments: 6
Former CIA CTO Talks Meltdown and Spectre Cost, Federal Threats
Last Message: 1/27/2018
 |  Comments: 1
Five Ways To (Physically) Hack A Data Center
Last Message: 1/27/2018
 |  Comments: 3
Internet of Things Meets Tech Support
Last Message: 1/25/2018
 |  Comments: 8
Doh!!! The 10 Most Overlooked Security Tasks
Last Message: 1/24/2018
 |  Comments: 2
Which CISO 'Tribe' Do You Belong To?
Last Message: 1/24/2018
 |  Comments: 2
45% of Businesses Say Employees Are Biggest Security Risk
Last Message: 1/23/2018
 |  Comments: 1
Google Pays Researcher Record $112,500 for Android Flaw
Last Message: 1/23/2018
 |  Comments: 1
Researchers Offer 'a VirusTotal' for ICS
Last Message: 1/23/2018
 |  Comments: 2
8 Steps for Building an IT Security Career Path Program
Last Message: 1/23/2018
 |  Comments: 1
20 Cybersecurity Vendors Getting Venture Capital Love
Last Message: 1/23/2018
 |  Comments: 1
Fileless Malware Attacks Hit Milestone in 2017
Last Message: 1/23/2018
 |  Comments: 1
Up to 40K Affected in Credit Card Breach at OnePlus
Last Message: 1/22/2018
 |  Comments: 2
Internet of Things: 4 Security Tips From The Military
Last Message: 1/22/2018
 |  Comments: 14
Kaspersky Lab Seeks Injunction Against US Government Ban
Last Message: 1/21/2018
 |  Comments: 1
BEC Attacks to Exceed $9B in 2018: Trend Micro
Last Message: 1/20/2018
 |  Comments: 1
Whats The Risk? 3 Things To Know About Chatbots & Cybersecurity
Last Message: 1/19/2018
 |  Comments: 6
How to Attract More Women Into Cybersecurity Now
Last Message: 1/18/2018
 |  Comments: 5
'Reaper': The Professional Bot Herders Thingbot
Last Message: 1/18/2018
 |  Comments: 1
'Back to Basics' Might Be Your Best Security Weapon
Last Message: 1/18/2018
 |  Comments: 6
CISOs' No. 1 Concern in 2018: The Talent Gap
Last Message: 1/17/2018
 |  Comments: 8
Responding to the Rise of Fileless Attacks
Last Message: 1/16/2018
 |  Comments: 1
CISOs' Cyber War: How Did We Get Here?
Last Message: 1/14/2018
 |  Comments: 3
'Shift Left': Codifying Intuition into Secure DevOps
Last Message: 1/13/2018
 |  Comments: 2
AI in Cybersecurity: Where We Stand & Where We Need to Go
Last Message: 1/12/2018
 |  Comments: 2
Privacy: The Dark Side of the Internet of Things
Last Message: 1/12/2018
 |  Comments: 1
Advanced Deception: How It Works & Why Attackers Hate It
Last Message: 1/12/2018
 |  Comments: 3
Cisco Adds Encrypted Traffic Analysis Function
Last Message: 1/11/2018
 |  Comments: 2
Why Facebook Security Questions Are no Substitute for MFA
Last Message: 1/11/2018
 |  Comments: 1
A Pragmatic Approach to Fixing Cybersecurity: 5 Steps
Last Message: 1/11/2018
 |  Comments: 1
The Future Of ATM Hacking
Last Message: 1/11/2018
 |  Comments: 6
Page 1 / 2   >   >>


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11311
PUBLISHED: 2018-05-20
A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.
CVE-2018-11319
PUBLISHED: 2018-05-20
Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to ...
CVE-2018-11242
PUBLISHED: 2018-05-20
An issue was discovered in the MakeMyTrip application 7.2.4 for Android. The databases (locally stored) are not encrypted and have cleartext that might lead to sensitive information disclosure, as demonstrated by data/com.makemytrip/databases and data/com.makemytrip/Cache SQLite database files.
CVE-2018-11315
PUBLISHED: 2018-05-20
The Local HTTP API in Radio Thermostat CT50 and CT80 1.04.84 and below products allows unauthorized access via a DNS rebinding attack. This can result in remote device temperature control, as demonstrated by a tstat t_heat request that accesses a device purchased in the Spring of 2018, and sets a ho...
CVE-2018-11239
PUBLISHED: 2018-05-19
An integer overflow in the _transfer function of a smart contract implementation for Hexagon (HXG), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets by providing a _to argument in conjunction with a large _value argument, as exploited in the wild in ...