Dark Reading Article Boards

Message Boards posted in July 2016
Google Adds New Kernel-Level Protections For Android
Last Message: 7/31/2016
 |  Comments: 1
Russia Likely Behind DNC Breach, Says FBI
Last Message: 7/31/2016
 |  Comments: 5
New Ranscam Ransomware Lowers The Bar But Raises The Stakes
Last Message: 7/30/2016
 |  Comments: 3
How to Roll Your Own Threat Intelligence Team
Last Message: 7/29/2016
 |  Comments: 1
Russia Rejects DNC Breach Allegations As 'Old Trick'
Last Message: 7/29/2016
 |  Comments: 5
Legal Sector's Threat Intel-Sharing Group Grows
Last Message: 7/28/2016
 |  Comments: 1
Ex-Citibank Worker Jailed For Sabotage Of Network
Last Message: 7/28/2016
 |  Comments: 1
Obama Issues Federal Government Policy For Cyberattack Response
Last Message: 7/27/2016
 |  Comments: 6
In Security, Know That You Know Nothing
Last Message: 7/27/2016
 |  Comments: 7
Asia Mulls Europol-Style Agency To Fight Cybercrime
Last Message: 7/26/2016
 |  Comments: 1
Edward Snowden Designs Anti-Spying Smartphone Device
Last Message: 7/26/2016
 |  Comments: 1
Report Finds Healthcare Most Targeted By Ransomware
Last Message: 7/26/2016
 |  Comments: 1
Meet The Teams In DARPA's All-Machine Hacking Tournament
Last Message: 7/25/2016
 |  Comments: 1
Ransomware Victims Rarely Pay The Full Ransom Price
Last Message: 7/21/2016
 |  Comments: 2
Beyond Data: Why CISOs Must Pay Attention To Physical Security
Last Message: 7/20/2016
 |  Comments: 1
Remote Systems Admin Software Rigged With Lurk Trojan
Last Message: 7/20/2016
 |  Comments: 1
The Blind Spot Between The Cloud & The Data Center
Last Message: 7/19/2016
 |  Comments: 2
Context-Rich And Context-Aware Cybersecurity
Last Message: 7/18/2016
 |  Comments: 1
vBulletin.com Hacked, Customer Data Stolen
Last Message: 7/18/2016
 |  Comments: 8
Staying Cyber Safe At The Olympics
Last Message: 7/18/2016
 |  Comments: 1
What SMBs Need To Know About Security But Are Afraid To Ask
Last Message: 7/17/2016
 |  Comments: 1
Purple Teaming: Red & Blue Living Together, Mass Hysteria
Last Message: 7/14/2016
 |  Comments: 1
Ripping Away The Mobile Security Blanket
Last Message: 7/14/2016
 |  Comments: 1
What I Expect to See At Black Hat 2016: 5 Themes
Last Message: 7/13/2016
 |  Comments: 1
Why Aren't There More Women In IT Security?
Last Message: 7/13/2016
 |  Comments: 48
EUs General Data Protection Regulation Is Law: Now What?
Last Message: 7/13/2016
 |  Comments: 2
ICS Mess: US Industrial Systems The Most Exposed
Last Message: 7/13/2016
 |  Comments: 1
EU Approves Revised Pact For Data Transfer With US
Last Message: 7/11/2016
 |  Comments: 1
Hacking A Penetration Tester
Last Message: 7/11/2016
 |  Comments: 1
8 Ways Ethically Compromised Employees Compromise Security
Last Message: 7/11/2016
 |  Comments: 1
How Not To Write A Pen Test RFP
Last Message: 7/8/2016
 |  Comments: 1
A Holistic Approach to Cybersecurity Wellness: 3 Strategies
Last Message: 7/7/2016
 |  Comments: 1
Recalibrating Cybersecurity Spending Projections
Last Message: 7/7/2016
 |  Comments: 1
The Attribution Question: Does It Matter Who Attacked You?
Last Message: 7/7/2016
 |  Comments: 3
One iPhone In Every Large Company Infected With Malware
Last Message: 7/6/2016
 |  Comments: 3
5 Tips For Staying Cyber-Secure On Your Summer Vacation
Last Message: 7/6/2016
 |  Comments: 3
6 Ways to Keep Android Phones Safe
Last Message: 7/5/2016
 |  Comments: 3
The Clinton Email Kerfuffle & Shadow IT
Last Message: 7/5/2016
 |  Comments: 9
Hacker From Oklahoma Pleads Guilty In DDoS Attack Case
Last Message: 7/4/2016
 |  Comments: 1
Passwords To Be Phased Out By 2025, Say InfoSec Pros
Last Message: 7/1/2016
 |  Comments: 6
Over 25,000 IoT CCTV Cameras Used In DDoS Attack
Last Message: 7/1/2016
 |  Comments: 6
6 Recent Real-Life Cyber Extortion Scams
Last Message: 7/1/2016
 |  Comments: 3


Government Shutdown Brings Certificate Lapse Woes
Curtis Franklin Jr., Senior Editor at Dark Reading,  1/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-9276
PUBLISHED: 2019-01-16
SmarterTools SmarterMail before 13.3.5535 was vulnerable to stored XSS by bypassing the anti-XSS mechanisms. It was possible to run JavaScript code when a victim user opens or replies to the attacker's email, which contained a malicious payload. Therefore, users' passwords could be reset by using an...
CVE-2015-9277
PUBLISHED: 2019-01-16
MailEnable before 8.60 allows Directory Traversal for reading the messages of other users, uploading files, and deleting files because "/../" and "/.. /" are mishandled.
CVE-2015-9278
PUBLISHED: 2019-01-16
MailEnable before 8.60 allows Privilege Escalation because admin accounts could be created as a consequence of %0A mishandling in AUTH.TAB after a password-change request.
CVE-2015-9279
PUBLISHED: 2019-01-16
MailEnable before 8.60 allows Stored XSS via malformed use of "<img/src" with no ">" character in the body of an e-mail message.
CVE-2015-9280
PUBLISHED: 2019-01-16
MailEnable before 8.60 allows XXE via an XML document in the request.aspx Options parameter.