Dark Reading Article Boards

Message Boards posted in April 2017
Page 1 / 2   >   >>
4 Industries Account for Majority of Global Ransomware Attacks
Last Message: 4/30/2017
 |  Comments: 11
7 Tips For Mitigating Phishing And Business Email Hacks
Last Message: 4/30/2017
 |  Comments: 3
Microsoft App Aims to Delete the Password
Last Message: 4/29/2017
 |  Comments: 9
IRS and Immigration Officials Impersonated in Call Center Scam
Last Message: 4/28/2017
 |  Comments: 3
Microsoft Updates Foreign Surveillance Request Count
Last Message: 4/28/2017
 |  Comments: 3
HHS Hits CardioNet with $2.5M HIPAA Settlement Fee
Last Message: 4/28/2017
 |  Comments: 2
So You Want to Be a Security Rock Star?
Last Message: 4/27/2017
 |  Comments: 3
Half of Security Pros Ignore Some Important Alerts
Last Message: 4/27/2017
 |  Comments: 1
6 Steps to Find Your Next Dozen Cloud Security Experts
Last Message: 4/27/2017
 |  Comments: 1
6 Times Hollywood Got Security Right
Last Message: 4/26/2017
 |  Comments: 5
Macron Targeted by Russian Cyber Spies
Last Message: 4/26/2017
 |  Comments: 2
The Hidden Dangers of Component Vulnerabilities
Last Message: 4/26/2017
 |  Comments: 1
IT Engineer Stole Source Code to Verify Acquisition
Last Message: 4/24/2017
 |  Comments: 2
3 Tips for Updating an Endpoint Security Strategy
Last Message: 4/23/2017
 |  Comments: 1
Heartbleed's Intranet & VPN Connection
Last Message: 4/20/2017
 |  Comments: 7
How Top Security Execs are Doing More with Less
Last Message: 4/19/2017
 |  Comments: 3
The Implications Behind Proposed Internet Privacy Rules
Last Message: 4/19/2017
 |  Comments: 4
Why Brand Trumps Tech in C-Level Conversations
Last Message: 4/18/2017
 |  Comments: 1
Health Savings Account Fraud: The Rapidly Growing Threat
Last Message: 4/17/2017
 |  Comments: 1
1 Out of 5 Companies Have Suffered Mobile Device Breach
Last Message: 4/17/2017
 |  Comments: 1
Cartoon: Cloud (In)security
Last Message: 4/17/2017
 |  Comments: 2
Engineer Arrested for Attempted Theft of Trade Secrets
Last Message: 4/15/2017
 |  Comments: 1
In Appreciation: Howard A. Schmidt
Last Message: 4/14/2017
 |  Comments: 1
The Interconnected Nature Of International Cybercrime
Last Message: 4/13/2017
 |  Comments: 2
How to Crack Cybersecuritys Glass Ceiling
Last Message: 4/13/2017
 |  Comments: 7
Slide Show: Top 10 Malware Advances In 2012
Last Message: 4/13/2017
 |  Comments: 1
Microsoft Office Zero-Day Patched After Months of Attacks
Last Message: 4/12/2017
 |  Comments: 1
UK Loan Firm Wonga Suffers Financial Data Breach
Last Message: 4/11/2017
 |  Comments: 1
Tax Season Surprise: W-2 Fraud
Last Message: 4/11/2017
 |  Comments: 1
CIA-Linked Hacking Tools Tied to Longhorn Cyber Espionage Group
Last Message: 4/11/2017
 |  Comments: 2
FAFSA Tool Taken Offline After Breach Report
Last Message: 4/11/2017
 |  Comments: 3
When Hacks Are about Image instead of Money
Last Message: 4/11/2017
 |  Comments: 1
Hiring Hackers To Secure The Internet Of Things
Last Message: 4/11/2017
 |  Comments: 3
'Sundown' Rises as New Threat in Depleted Exploit Kit Landscape
Last Message: 4/11/2017
 |  Comments: 1
Top 5 Dumbest Cyber Threats That Still Pay Off
Last Message: 4/11/2017
 |  Comments: 1
Office 365 Gets Data Governance, Threat Intelligence Tools
Last Message: 4/11/2017
 |  Comments: 1
8 Valuable Security Certifications For 2017
Last Message: 4/10/2017
 |  Comments: 7
7 Reasons Consumers Dont Take Action on Cybersecurity
Last Message: 4/10/2017
 |  Comments: 16
12 Tips for Securing Cyber Insurance Coverage
Last Message: 4/10/2017
 |  Comments: 3
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6499
PUBLISHED: 2019-01-21
Teradata Viewpoint before 14.0 and 16.20.00.02-b80 contains a hardcoded password of TDv1i2e3w4 for the viewpoint database account (in viewpoint-portal\conf\server.xml) that could potentially be exploited by malicious users to compromise the affected system.
CVE-2019-6500
PUBLISHED: 2019-01-21
In Axway File Transfer Direct 2.7.1, an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request with %2e instead of '.' characters, as demonstrated by an initial /h2hdocumentation//%2e%2e/ substring.
CVE-2019-6498
PUBLISHED: 2019-01-21
GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c because strncpy is misused.
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
CVE-2018-18908
PUBLISHED: 2019-01-20
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requ...