Dark Reading Article Boards

Message Boards posted in December 2017
Page 1 / 2   >   >>
US Census Bureau: Data Exposed in Alteryx Leak Already Public
Last Message: 12/31/2017
 |  Comments: 11
Network Printer & Scanner Spoofing Campaign Targets Millions
Last Message: 12/29/2017
 |  Comments: 1
Mozilla Issues Critical Security Patch for Thunderbird Flaw
Last Message: 12/29/2017
 |  Comments: 1
8 Out of 10 Employees Use Unencrypted USB Devices
Last Message: 12/28/2017
 |  Comments: 1
CISO Holiday Miracle Wish List
Last Message: 12/27/2017
 |  Comments: 1
Facebook Helps Users Detect Phishing Emails
Last Message: 12/27/2017
 |  Comments: 8
Be a More Effective CISO by Aligning Security to the Business
Last Message: 12/25/2017
 |  Comments: 6
Five Arrested for Cerber, CTB-Locker Ransomware Spread
Last Message: 12/24/2017
 |  Comments: 7
80% of Americans Admit to Risky Cybersecurity Behaviors
Last Message: 12/20/2017
 |  Comments: 4
Kaspersky Lab Files Lawsuit Over DHS Ban of its Products
Last Message: 12/19/2017
 |  Comments: 1
Security Geek Gift Guide
Last Message: 12/18/2017
 |  Comments: 1
2 Million Fake Net Neutrality Comments Stole American Identities
Last Message: 12/18/2017
 |  Comments: 4
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Last Message: 12/18/2017
 |  Comments: 8
19 M California Voter Records Held for Ransom in MongoDB Attack
Last Message: 12/18/2017
 |  Comments: 1
Mobile Security Gap Threatens Enterprises
Last Message: 12/17/2017
 |  Comments: 8
6 Personality Profiles of White-Hat Hackers
Last Message: 12/15/2017
 |  Comments: 1
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Last Message: 12/15/2017
 |  Comments: 2
Malware Decompiler Tool Goes Open Source
Last Message: 12/15/2017
 |  Comments: 1
Healthcare Faces Poor Cybersecurity Prognosis
Last Message: 12/14/2017
 |  Comments: 1
Uber's Security Slip-ups: What Went Wrong
Last Message: 12/14/2017
 |  Comments: 2
Security Compliance: The Less You Spend the More You Pay
Last Message: 12/14/2017
 |  Comments: 1
Lack of Experience Biggest Obstacle for InfoSec Career
Last Message: 12/13/2017
 |  Comments: 3
Dark Reading Launches New Conference on Cyber Defense
Last Message: 12/13/2017
 |  Comments: 8
Cybersecurity's Ceiling
Last Message: 12/13/2017
 |  Comments: 7
Oracle Product Rollout Underscores Need for Trust in the Cloud
Last Message: 12/13/2017
 |  Comments: 1
Throw Out the Playbooks to Win at Incident Response
Last Message: 12/13/2017
 |  Comments: 5
New York's Historic FinSec Regulation Covers DDoS, Not Just Data
Last Message: 12/13/2017
 |  Comments: 1
Hacking the Security Job Application Process
Last Message: 12/13/2017
 |  Comments: 1
A Call for New Voices on the Security Conference Circuit
Last Message: 12/13/2017
 |  Comments: 4
Security Training & Awareness: 3 Big Myths
Last Message: 12/13/2017
 |  Comments: 6
Preventing Credential Theft: A Security Checklist for Boards
Last Message: 12/13/2017
 |  Comments: 1
Mischel Kwon Unplugged
Last Message: 12/13/2017
 |  Comments: 1
Hiring Outside the Box in Cybersecurity
Last Message: 12/13/2017
 |  Comments: 2
Only 5% of Business Leaders Rethought Security After Equifax
Last Message: 12/12/2017
 |  Comments: 1
5 Free or Low-Cost Security Tools for Defenders
Last Message: 12/12/2017
 |  Comments: 1
Nearly 2/3 of Industrial Companies Lack Security Monitoring
Last Message: 12/12/2017
 |  Comments: 1
10 Essential Elements For Your Incident-Response Plan
Last Message: 12/11/2017
 |  Comments: 4
Emerging IT Security Technologies: 13 Categories, 26 Vendors
Last Message: 12/8/2017
 |  Comments: 1
Page 1 / 2   >   >>


Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Risk, Privacy, and Information Security Officer, AvePoint, Inc.,  8/20/2018
Ohio Man Sentenced To 15 Months For BEC Scam
Dark Reading Staff 8/20/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10902
PUBLISHED: 2018-08-21
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possib...
CVE-2018-10932
PUBLISHED: 2018-08-21
lldptool version 1.0.1 and older can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal.
CVE-2018-15660
PUBLISHED: 2018-08-21
** DISPUTED ** An issue was discovered in the Ola Money (aka com.olacabs.olamoney) application 1.9.0 for Android. If an attacker controls an application with accessibility permissions, then the attacker can read certain Ola Money data such as a credit card number, expiration date, bank account numbe...
CVE-2018-15661
PUBLISHED: 2018-08-21
** DISPUTED ** An issue was discovered in the Ola Money (aka com.olacabs.olamoney) application 1.9.0 for Android. If an attacker controls an application with accessibility permissions and the ability to read SMS messages, then the Forgot Password screen can be used to bypass authentication. NOTE: th...
CVE-2018-15481
PUBLISHED: 2018-08-21
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x before 5.1.13 allows authenticated remote attackers to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the...