Dark Reading Article Boards

Message Boards posted in November 2013
"Hackers Threaten Destruction Of Obamacare Website"
Last Message: 11/30/2013
 |  Comments: 33
Authentication + Mobile Phone = Password Killer
Last Message: 11/29/2013
 |  Comments: 11
Spamhaus Shows What's Next For Block Listing
Last Message: 11/28/2013
 |  Comments: 12
Data Mining Snares Health Insurance Fraud
Last Message: 11/28/2013
 |  Comments: 1
NSA Surveillance: First Prism, Now Muscled Out Of Cloud
Last Message: 11/27/2013
 |  Comments: 2
Dataium Settles Browser History Sniffing Charges
Last Message: 11/27/2013
 |  Comments: 3
"Military Needs Better Battleground Biometrics"
Last Message: 11/25/2013
 |  Comments: 7
Understanding IT Risk Management In 4 Steps X 3
Last Message: 11/25/2013
 |  Comments: 10
Google Settles With State AGs On Privacy
Last Message: 11/23/2013
 |  Comments: 7
Mobile App Security: 5 Frequent Woes Persist
Last Message: 11/22/2013
 |  Comments: 4
Close HealthCare.gov For Security Reasons, Experts Say
Last Message: 11/22/2013
 |  Comments: 6
'i2Ninja' Trojan Taps Anonymized Darknet
Last Message: 11/22/2013
 |  Comments: 3
FBI Blames Federal Hacks On Anonymous Campaign
Last Message: 11/22/2013
 |  Comments: 9
"6 Worst Data Breaches Of 2011"
Last Message: 11/21/2013
 |  Comments: 2
The New Security Architecture
Last Message: 11/21/2013
 |  Comments: 14
Facebook Forces Some Users To Reset Passwords
Last Message: 11/20/2013
 |  Comments: 16
Cupid Concedes January Hack, 42 Million Passwords Stolen
Last Message: 11/20/2013
 |  Comments: 1
iPhone Photo Leads To Cybercrime Arrest
Last Message: 11/20/2013
 |  Comments: 7
BYOD: 'We Have Met the Enemy & He Is Us'
Last Message: 11/19/2013
 |  Comments: 6
Secure Your Network From Modern Hazards
Last Message: 11/19/2013
 |  Comments: 7
Kelihos Botnet Thrives, Despite Takedowns
Last Message: 11/18/2013
 |  Comments: 4
Higher Ed Must Lock Down Data Security
Last Message: 11/18/2013
 |  Comments: 4
IT Security Faces Big Data Skills and Resource Gap
Last Message: 11/18/2013
 |  Comments: 1
"Kelihos Botnet Thrives, Despite Takedowns"
Last Message: 11/18/2013
 |  Comments: 2
DDoS Attack: Preparing For The Inevitable
Last Message: 11/17/2013
 |  Comments: 1
LinkedIn Lesson: Detail Security First, Feature Fest Second
Last Message: 11/17/2013
 |  Comments: 1
Avoid The Bermuda Triangle of Cloud Security
Last Message: 11/16/2013
 |  Comments: 1


Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3018
PUBLISHED: 2018-05-24
The AXIS webapp in deploy-tomcat/axis in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 allows remote attackers to obtain sensitive configuration information via a direct request, as demonstrated by happyaxis.jsp. IBM X-Force ID: 84354.
CVE-2013-3023
PUBLISHED: 2018-05-24
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 might allow remote attackers to obtain sensitive information about Tomcat credentials by sniffing the network for a session in which HTTP is used. IBM X-Force ID: 84361.
CVE-2013-3024
PUBLISHED: 2018-05-24
IBM WebSphere Application Server (WAS) 8.5 through 8.5.0.2 on UNIX allows local users to gain privileges by leveraging improper process initialization. IBM X-Force ID: 84362.
CVE-2018-5674
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
CVE-2018-5675
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...