Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in November 2016
Page 1 / 2   >   >>
New Internet Security Domains Debut
Last Message: 11/30/2016
 |  Comments: 12
How Clinton, Trump Could Champion Cybersecurity
Last Message: 11/30/2016
 |  Comments: 13
5 Links Of The Attack Chain And How To Disrupt Them
Last Message: 11/29/2016
 |  Comments: 1
Balancing The Risk & Promise Of The Internet Of Things
Last Message: 11/28/2016
 |  Comments: 1
NSA Chief Says DNC Email Leak Was Deliberate Act
Last Message: 11/28/2016
 |  Comments: 15
"HTTPS Hackable In 30 Seconds: DHS Alert"
Last Message: 11/28/2016
 |  Comments: 1
Snowden May Help Explain Your Job To Your Family
Last Message: 11/26/2016
 |  Comments: 5
Oracle Announces Acquisition Of Dyn
Last Message: 11/24/2016
 |  Comments: 1
Why Cybersecurity Certifications Matter -- Or Not
Last Message: 11/23/2016
 |  Comments: 8
Windows 10 Updates Target Ransomware Threats
Last Message: 11/22/2016
 |  Comments: 2
The 7 Most Significant Government Data Breaches
Last Message: 11/21/2016
 |  Comments: 3
Attacker's Playbook Top 5 Is High On Passwords, Low On Malware
Last Message: 11/21/2016
 |  Comments: 5
6 Tips To Secure Webcams, Stop Keyloggers
Last Message: 11/21/2016
 |  Comments: 10
5 Ways Retailers Can Stay Safe Over the Holidays
Last Message: 11/21/2016
 |  Comments: 1
The 7 Types Of Security Jobs, According To NIST
Last Message: 11/18/2016
 |  Comments: 4
Russian Hackers Behind DNC Breach Wage Post-US Election Attacks
Last Message: 11/18/2016
 |  Comments: 7
Bug Bounties and the Zero-Day Trade
Last Message: 11/16/2016
 |  Comments: 7
Data Manipulation: An Imminent Threat
Last Message: 11/16/2016
 |  Comments: 3
Ubuntu Forums Database Hacked
Last Message: 11/16/2016
 |  Comments: 5
Firmware Secretly Sent Text, Call Data On Android Users To China
Last Message: 11/16/2016
 |  Comments: 1
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Last Message: 11/15/2016
 |  Comments: 1
How Secure is Secure? Tips For Investing In The Right Strategy
Last Message: 11/14/2016
 |  Comments: 2
Learning To Trust Cloud Security
Last Message: 11/14/2016
 |  Comments: 1
FBI: BEC Scam Attempts Amount to $3 Billion
Last Message: 11/13/2016
 |  Comments: 1
75,000 Data Protection Officers Needed By 2018 To Handle EU Law
Last Message: 11/11/2016
 |  Comments: 2
How To Build A Comprehensive Security Architecture
Last Message: 11/11/2016
 |  Comments: 1
Transitioning From The Server Room To The Boardroom
Last Message: 11/8/2016
 |  Comments: 1
Some SuperPAC Websites Are Not Super-Secure
Last Message: 11/7/2016
 |  Comments: 1
Catching Online Scammers, Dealers & Drug Dealers With DNS
Last Message: 11/7/2016
 |  Comments: 1
'AtomBombing' Microsoft Windows Via Code Injection
Last Message: 11/7/2016
 |  Comments: 1
20 Endpoint Security Questions You Never Thought to Ask
Last Message: 11/6/2016
 |  Comments: 3
Election 2016 & WikiLeaks: Bad, But Not Your Worst Nightmare
Last Message: 11/5/2016
 |  Comments: 1
Microsoft Launches Security Program For Azure IoT
Last Message: 11/1/2016
 |  Comments: 2
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...