Dark Reading Article Boards

Message Boards posted in November 2013
"Hackers Threaten Destruction Of Obamacare Website"
Last Message: 11/30/2013
 |  Comments: 33
Authentication + Mobile Phone = Password Killer
Last Message: 11/29/2013
 |  Comments: 11
Spamhaus Shows What's Next For Block Listing
Last Message: 11/28/2013
 |  Comments: 12
Data Mining Snares Health Insurance Fraud
Last Message: 11/28/2013
 |  Comments: 1
NSA Surveillance: First Prism, Now Muscled Out Of Cloud
Last Message: 11/27/2013
 |  Comments: 2
Dataium Settles Browser History Sniffing Charges
Last Message: 11/27/2013
 |  Comments: 3
"Military Needs Better Battleground Biometrics"
Last Message: 11/25/2013
 |  Comments: 7
Understanding IT Risk Management In 4 Steps X 3
Last Message: 11/25/2013
 |  Comments: 10
Google Settles With State AGs On Privacy
Last Message: 11/23/2013
 |  Comments: 7
Mobile App Security: 5 Frequent Woes Persist
Last Message: 11/22/2013
 |  Comments: 4
Close HealthCare.gov For Security Reasons, Experts Say
Last Message: 11/22/2013
 |  Comments: 6
'i2Ninja' Trojan Taps Anonymized Darknet
Last Message: 11/22/2013
 |  Comments: 3
FBI Blames Federal Hacks On Anonymous Campaign
Last Message: 11/22/2013
 |  Comments: 9
"6 Worst Data Breaches Of 2011"
Last Message: 11/21/2013
 |  Comments: 2
The New Security Architecture
Last Message: 11/21/2013
 |  Comments: 14
Facebook Forces Some Users To Reset Passwords
Last Message: 11/20/2013
 |  Comments: 16
Cupid Concedes January Hack, 42 Million Passwords Stolen
Last Message: 11/20/2013
 |  Comments: 1
iPhone Photo Leads To Cybercrime Arrest
Last Message: 11/20/2013
 |  Comments: 7
BYOD: 'We Have Met the Enemy & He Is Us'
Last Message: 11/19/2013
 |  Comments: 6
Secure Your Network From Modern Hazards
Last Message: 11/19/2013
 |  Comments: 7
Kelihos Botnet Thrives, Despite Takedowns
Last Message: 11/18/2013
 |  Comments: 4
Higher Ed Must Lock Down Data Security
Last Message: 11/18/2013
 |  Comments: 4
IT Security Faces Big Data Skills and Resource Gap
Last Message: 11/18/2013
 |  Comments: 1
"Kelihos Botnet Thrives, Despite Takedowns"
Last Message: 11/18/2013
 |  Comments: 2
DDoS Attack: Preparing For The Inevitable
Last Message: 11/17/2013
 |  Comments: 1
LinkedIn Lesson: Detail Security First, Feature Fest Second
Last Message: 11/17/2013
 |  Comments: 1
Avoid The Bermuda Triangle of Cloud Security
Last Message: 11/16/2013
 |  Comments: 1


Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19279
PUBLISHED: 2018-11-14
PRIMX ZoneCentral before 6.1.2236 on Windows sometimes leaks the plaintext of NTFS files. On non-SSD devices, this is limited to a 5-second window and file sizes less than 600 bytes. The effect on SSD devices may be greater.
CVE-2018-19280
PUBLISHED: 2018-11-14
Centreon 3.4.x has XSS via the resource name or macro expression of a poller macro.
CVE-2018-19281
PUBLISHED: 2018-11-14
Centreon 3.4.x allows SNMP trap SQL Injection.
CVE-2018-17960
PUBLISHED: 2018-11-14
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.
CVE-2018-19278
PUBLISHED: 2018-11-14
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed lengt...