Dark Reading Article Boards

Message Boards posted in January 2018
Page 1 / 2   >   >>
5 Questions to Ask about Machine Learning
Last Message: 1/31/2018
 |  Comments: 1
Thieves Target ATMs In First US 'Jackpotting' Attacks
Last Message: 1/30/2018
 |  Comments: 1
10 Costs Your Cyber Insurance Policy May Not Cover
Last Message: 1/29/2018
 |  Comments: 6
Most Office 365 Admins Rely on Recycle Bin for Data Backup
Last Message: 1/29/2018
 |  Comments: 7
Ransomware Detections Up 90% for Businesses in 2017
Last Message: 1/28/2018
 |  Comments: 2
Facebook Buys Identity Verification Firm
Last Message: 1/27/2018
 |  Comments: 6
Former CIA CTO Talks Meltdown and Spectre Cost, Federal Threats
Last Message: 1/27/2018
 |  Comments: 1
Five Ways To (Physically) Hack A Data Center
Last Message: 1/27/2018
 |  Comments: 3
Internet of Things Meets Tech Support
Last Message: 1/25/2018
 |  Comments: 8
Which CISO 'Tribe' Do You Belong To?
Last Message: 1/24/2018
 |  Comments: 2
45% of Businesses Say Employees Are Biggest Security Risk
Last Message: 1/23/2018
 |  Comments: 1
Google Pays Researcher Record $112,500 for Android Flaw
Last Message: 1/23/2018
 |  Comments: 1
Researchers Offer 'a VirusTotal' for ICS
Last Message: 1/23/2018
 |  Comments: 2
8 Steps for Building an IT Security Career Path Program
Last Message: 1/23/2018
 |  Comments: 1
20 Cybersecurity Vendors Getting Venture Capital Love
Last Message: 1/23/2018
 |  Comments: 1
Fileless Malware Attacks Hit Milestone in 2017
Last Message: 1/23/2018
 |  Comments: 1
Up to 40K Affected in Credit Card Breach at OnePlus
Last Message: 1/22/2018
 |  Comments: 2
Internet of Things: 4 Security Tips From The Military
Last Message: 1/22/2018
 |  Comments: 14
Kaspersky Lab Seeks Injunction Against US Government Ban
Last Message: 1/21/2018
 |  Comments: 1
BEC Attacks to Exceed $9B in 2018: Trend Micro
Last Message: 1/20/2018
 |  Comments: 1
Whats The Risk? 3 Things To Know About Chatbots & Cybersecurity
Last Message: 1/19/2018
 |  Comments: 6
How to Attract More Women Into Cybersecurity Now
Last Message: 1/18/2018
 |  Comments: 5
'Reaper': The Professional Bot Herders Thingbot
Last Message: 1/18/2018
 |  Comments: 1
'Back to Basics' Might Be Your Best Security Weapon
Last Message: 1/18/2018
 |  Comments: 6
CISOs' No. 1 Concern in 2018: The Talent Gap
Last Message: 1/17/2018
 |  Comments: 8
Responding to the Rise of Fileless Attacks
Last Message: 1/16/2018
 |  Comments: 1
CISOs' Cyber War: How Did We Get Here?
Last Message: 1/14/2018
 |  Comments: 3
'Shift Left': Codifying Intuition into Secure DevOps
Last Message: 1/13/2018
 |  Comments: 2
AI in Cybersecurity: Where We Stand & Where We Need to Go
Last Message: 1/12/2018
 |  Comments: 2
Privacy: The Dark Side of the Internet of Things
Last Message: 1/12/2018
 |  Comments: 1
Advanced Deception: How It Works & Why Attackers Hate It
Last Message: 1/12/2018
 |  Comments: 3
Cisco Adds Encrypted Traffic Analysis Function
Last Message: 1/11/2018
 |  Comments: 2
Why Facebook Security Questions Are no Substitute for MFA
Last Message: 1/11/2018
 |  Comments: 1
A Pragmatic Approach to Fixing Cybersecurity: 5 Steps
Last Message: 1/11/2018
 |  Comments: 1
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.