Dark Reading Article Boards

Message Boards posted in December 2013
Target Breach: 10 Facts
Last Message: 12/30/2013
 |  Comments: 23
How Mobile Security Lags BYOD
Last Message: 12/27/2013
 |  Comments: 6
IT Security Risk Management: Is It Worth The Cost?
Last Message: 12/27/2013
 |  Comments: 7
2013: Rest In Peace, Passwords
Last Message: 12/26/2013
 |  Comments: 16
"File Sync And Sharing: Users Won't Give It Up"
Last Message: 12/25/2013
 |  Comments: 8
The State of IT Security: Its Broken
Last Message: 12/23/2013
 |  Comments: 14
BYOD Bingo
Last Message: 12/23/2013
 |  Comments: 6
Is Mob-Busting RICO Overkill For Combating Cybercrime?
Last Message: 12/23/2013
 |  Comments: 5
Secure Code Starts With Measuring What Developers Know
Last Message: 12/22/2013
 |  Comments: 2
My 5 Wishes For Security In 2014
Last Message: 12/20/2013
 |  Comments: 4
'ChewBacca' Malware Taps Tor Network
Last Message: 12/19/2013
 |  Comments: 2
Bitcoin Hit By Gameover Malware, Chinese Crackdown
Last Message: 12/19/2013
 |  Comments: 3
Safety Equipment
Last Message: 12/19/2013
 |  Comments: 2
Android AV Improves But Still Can't Nuke Malware
Last Message: 12/19/2013
 |  Comments: 4
How To Win A Cartoon Caption Contest (Tech Version)
Last Message: 12/17/2013
 |  Comments: 2
"NSA Vs. Your Smartphone: 5 Facts"
Last Message: 12/17/2013
 |  Comments: 5
NSA Surveillance Fallout Costs IT Industry Billions
Last Message: 12/17/2013
 |  Comments: 20
Advanced Power Botnet: Firefox Users, Beware
Last Message: 12/16/2013
 |  Comments: 1
Time For An Active Defense Against Security Attacks
Last Message: 12/16/2013
 |  Comments: 7
Why Fed Cybersecurity Reboot Plan Fails To Convince
Last Message: 12/13/2013
 |  Comments: 2
"Lessons Learned From N.Y. Times Hack Attack"
Last Message: 12/13/2013
 |  Comments: 1
Cybercrime Milestone: Guilty Plea In RICO Case
Last Message: 12/13/2013
 |  Comments: 5
Microsoft Fails To Nuke ZeroAccess Botnet
Last Message: 12/11/2013
 |  Comments: 1
White House Preparing National Online ID Plan
Last Message: 12/10/2013
 |  Comments: 3
Don't Be Overprotective About BYOD
Last Message: 12/10/2013
 |  Comments: 3
DARPA Crowdsources Bug-Spotting Games
Last Message: 12/9/2013
 |  Comments: 2
Application Security: We Still Have A Long Way To Go
Last Message: 12/9/2013
 |  Comments: 13
Juniper Mobile VPN Client Taps iOS Security Changes
Last Message: 12/9/2013
 |  Comments: 3
Online Extortion: The Ethics Of Unpublishing
Last Message: 12/9/2013
 |  Comments: 2
China Slams Bitcoins: What's Next?
Last Message: 12/8/2013
 |  Comments: 5
2 Million Stolen Passwords Recovered
Last Message: 12/7/2013
 |  Comments: 7
Why Security Awareness Is Like An Umbrella
Last Message: 12/6/2013
 |  Comments: 2
NSA Fallout: Microsoft Rethinks Customer Data Controls
Last Message: 12/6/2013
 |  Comments: 7
Bitcoin Password Grab Disguised As DDoS Attack
Last Message: 12/5/2013
 |  Comments: 6
Hardware Hacker Demos Zombie Drone Hijacker
Last Message: 12/4/2013
 |  Comments: 4
Weighing Costs Vs. Benefits Of NSA Surveillance
Last Message: 12/4/2013
 |  Comments: 5
Zero-Day Drive-By Attacks: Accelerating & Expanding
Last Message: 12/3/2013
 |  Comments: 5
Microsoft Office 365 Encrypted Email On Tap
Last Message: 12/2/2013
 |  Comments: 4
Cartoon: You Might Be A Security Expert If...
Last Message: 12/2/2013
 |  Comments: 4
LG Admits Smart TVs Spied On Users
Last Message: 12/2/2013
 |  Comments: 15


High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
CVE-2013-7469
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2018-20146
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
CVE-2019-5727
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.