Dark Reading Article Boards

Message Boards posted in December 2014
Page 1 / 2   >   >>
Tech Insight: Hacking The Nest Thermostat
Last Message: 12/31/2014
 |  Comments: 6
Why Digital Forensics In Incident Response Matter More Now
Last Message: 12/29/2014
 |  Comments: 6
The Coolest Hacks Of 2014
Last Message: 12/29/2014
 |  Comments: 9
Obama: U.S. Will Respond 'Proportionately' to Sony Cyber Attack
Last Message: 12/28/2014
 |  Comments: 20
North Korea's Internet Restored
Last Message: 12/27/2014
 |  Comments: 7
Time to Rethink Patching Strategies
Last Message: 12/26/2014
 |  Comments: 14
Security News No One Saw Coming In 2014
Last Message: 12/24/2014
 |  Comments: 12
CISO Holiday Bookshelf
Last Message: 12/22/2014
 |  Comments: 1
5 Pitfalls to Avoid When Running Your SOC
Last Message: 12/22/2014
 |  Comments: 6
New OpenSSL Flaw Exposes SSL To Man-In-The-Middle Attack
Last Message: 12/22/2014
 |  Comments: 10
The Internet's Winter Of Discontent
Last Message: 12/22/2014
 |  Comments: 1
'Grinch' Bug May Affect Most Linux Systems
Last Message: 12/22/2014
 |  Comments: 3
Sony Hackers Knew Details Of Sony's Entire IT Infrastructure
Last Message: 12/22/2014
 |  Comments: 32
The New Target for State-Sponsored Cyber Attacks: Applications
Last Message: 12/19/2014
 |  Comments: 1
How to Become a CISO
Last Message: 12/17/2014
 |  Comments: 87
Price Tag Rises For Stolen Identities Sold In The Underground
Last Message: 12/17/2014
 |  Comments: 4
Targeted Attacks: A Defender's Playbook
Last Message: 12/16/2014
 |  Comments: 3
FBI Calls For Law Facilitating Security Information Sharing
Last Message: 12/15/2014
 |  Comments: 2
Attackers Turn Focus to PoS Vendors
Last Message: 12/14/2014
 |  Comments: 1
DARPA Investigates Storytelling As Security Science
Last Message: 12/14/2014
 |  Comments: 1
'DeathRing' Malware Found Pre-Installed On Smartphones
Last Message: 12/12/2014
 |  Comments: 4
Ex-NSA Agents' Security Startup Lands $8 Million In Funding
Last Message: 12/11/2014
 |  Comments: 4
"Can The NSA Really Track Turned-Off Cellphones?"
Last Message: 12/11/2014
 |  Comments: 10
Breach Security 101
Last Message: 12/10/2014
 |  Comments: 1
'Inception' Cyber Espionage Campaign Targets PCs, Smartphones
Last Message: 12/10/2014
 |  Comments: 1
Employees Still Get More Access Than They Need
Last Message: 12/10/2014
 |  Comments: 1
Moving Beyond 2-Factor Authentication With Context
Last Message: 12/9/2014
 |  Comments: 11
2014: The Year of Shaken Trust
Last Message: 12/9/2014
 |  Comments: 1
Internet Of Things Devices Are Doomed
Last Message: 12/6/2014
 |  Comments: 10
Why Regin Malware Changes Threatscape Economics
Last Message: 12/5/2014
 |  Comments: 3
Q&A: Internet Encryption As The New Normal
Last Message: 12/4/2014
 |  Comments: 6
New TLS/SSL Version Ready In 2015
Last Message: 12/4/2014
 |  Comments: 2
The Case for Compelling Executive Dashboards
Last Message: 12/4/2014
 |  Comments: 4
The Real Cost of Cyber Incidents, According To Insurers
Last Message: 12/4/2014
 |  Comments: 3
Leveraging The Kill Chain For Awesome
Last Message: 12/4/2014
 |  Comments: 1
How I Became a CISO: Jonathan Trull, Qualys
Last Message: 12/3/2014
 |  Comments: 1
How Startups Can Jumpstart Security Innovation
Last Message: 12/3/2014
 |  Comments: 1
Why We Need Better Cyber Security: A Graphical Snapshot
Last Message: 12/3/2014
 |  Comments: 13
Cybercrooks Expand Sights To Market Manipulation
Last Message: 12/2/2014
 |  Comments: 2
Marrying Monitoring With IAM
Last Message: 12/2/2014
 |  Comments: 2
Youre Doing BYOD Wrong: These Numbers Prove It
Last Message: 12/2/2014
 |  Comments: 4
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.