Dark Reading Article Boards

Message Boards posted in November 2014
Page 1 / 2   >   >>
New Citadel Attack Targets Password Managers
Last Message: 11/30/2014
 |  Comments: 4
Apple, Security, And Disturbing Questions
Last Message: 11/30/2014
 |  Comments: 1
Cloud Security By The Numbers
Last Message: 11/27/2014
 |  Comments: 8
Don't Discount XSS Vulnerabilities
Last Message: 11/26/2014
 |  Comments: 4
Data Management Vs. Data Loss Prevention: Vive La Diffrence!
Last Message: 11/26/2014
 |  Comments: 4
New Attack Method Can Hit 95% Of iOS Devices
Last Message: 11/26/2014
 |  Comments: 8
Russian Cyber Espionage Under The Microscope
Last Message: 11/24/2014
 |  Comments: 8
Dairy Queen Breach Shines Light On Impact Of 3rd-Party Breaches
Last Message: 11/24/2014
 |  Comments: 7
Internet Architecture Board Calls For Net Encryption By Default
Last Message: 11/24/2014
 |  Comments: 10
New Certification Authority To Offer Free Certs For HTTPS
Last Message: 11/24/2014
 |  Comments: 5
The Week When Attackers Started Winning The War On Trust
Last Message: 11/24/2014
 |  Comments: 1
The Year Of The Retailer Data Breach
Last Message: 11/22/2014
 |  Comments: 4
ID Theft Monitoring Services: What You Need To Know
Last Message: 11/22/2014
 |  Comments: 3
FreedomPop Debuts Encrypted Snowden Phone
Last Message: 11/21/2014
 |  Comments: 5
How Enterprises Can Get The Most From Threat Intelligence
Last Message: 11/21/2014
 |  Comments: 2
Surveillance Cameras Next On The Insecure IoT List
Last Message: 11/21/2014
 |  Comments: 2
Retail Hacking: What To Expect This Holiday Season
Last Message: 11/21/2014
 |  Comments: 4
Killing Passwords: Dont Get A-Twitter Over Digits
Last Message: 11/21/2014
 |  Comments: 5
Enter The Digital Risk Officer
Last Message: 11/21/2014
 |  Comments: 1
The World's Most Hackable Cars
Last Message: 11/21/2014
 |  Comments: 25
Rethinking Security With A System Of 'Checks & Balances'
Last Message: 11/20/2014
 |  Comments: 7
Time To Turn The Tables On Attackers
Last Message: 11/20/2014
 |  Comments: 5
Microsoft Issues Emergency Patch Amid Targeted Attacks
Last Message: 11/19/2014
 |  Comments: 2
'Misdial Trap' Phone Scam Hits Financial Services
Last Message: 11/19/2014
 |  Comments: 2
Retail Hacking: What To Expect This Holiday Season
Last Message: 11/19/2014
 |  Comments: 95
Is Rogue IT Really A Problem?
Last Message: 11/18/2014
 |  Comments: 1
POS Malware Continues To Evolve
Last Message: 11/17/2014
 |  Comments: 7
'Bashlite' Malware Leverages ShellShock In BusyBox Attack
Last Message: 11/17/2014
 |  Comments: 4
NOAA Blames China In Hack, Breaks Disclosure Rules
Last Message: 11/17/2014
 |  Comments: 2
Smart Meter Hack Shuts Off The Lights
Last Message: 11/16/2014
 |  Comments: 5
Financial Breaches Show Trust Model Is Broken
Last Message: 11/15/2014
 |  Comments: 7
How I Became A CISO: Jennings Aske, Nuance Communications
Last Message: 11/15/2014
 |  Comments: 9
Stuxnet 'Patient Zero' Attack Targets Revealed
Last Message: 11/13/2014
 |  Comments: 5
How I Became A CISO: Quinn Shamblin, Boston University
Last Message: 11/13/2014
 |  Comments: 3
iOS 8 Vs. Android: How Secure Is Your Data?
Last Message: 11/13/2014
 |  Comments: 4
3 IT Practices That Add Risk To Cloud
Last Message: 11/13/2014
 |  Comments: 2
The Staggering Complexity of Application Security
Last Message: 11/12/2014
 |  Comments: 6
Drag Your Adolescent Incident-Response Program Into Adulthood
Last Message: 11/12/2014
 |  Comments: 2
Protecting the Customer-Facing Website
Last Message: 11/12/2014
 |  Comments: 28
Page 1 / 2   >   >>


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.