Author

 Jim Rapoza
Twitter
RSS
E-Mail

Profile of Jim Rapoza

News & Commentary Posts: 11

Jim Rapoza is Senior Research Analyst at the Aberdeen Group and Editorial Director for Tech Pro Essentials. For over 20 years he has been using, testing, and writing about the newest technologies in software, enterprise hardware, and the Internet. He previously served as the director of an award-winning technology testing lab based in Massachusetts and California. Rapoza is also the winner of five awards of excellence in technology journalism, and co-chaired a summit on technology industry security practices. He is a frequent speaker at technology conferences and expositions and has been regularly interviewed as a technology expert by national and local media outlets including CNN, ABC, NPR, and the Associated Press.

Articles by Jim Rapoza

HTML 5's Privacy Problem

10/13/2010
Lately there's been a lot of news and concern about perceived security and privacy problems in HTML 5. But while these concerns are certainly legitimate, for the most party there isn't really anything new here.

Post a Comment

Government Puts The Hurt On The Internet

9/28/2010
There are a lot of problems that face the Internet and technology today, from major security flaws to increasing infrastructure demands, you name it. But by far the biggest threats are the regular attempts by government and special interests to control the Internet and technology, attempts which would usually end up causing severe damage.

Post a Comment

Have A Secure Summer Vacation

6/30/2010
With summer now here officially, many of you are most likely planning vacations, and you probably want to be able to connect to the Internet during your vacation. But how do you do this securely?

Post a Comment

Cloud Is Real Culprit In iPad/AT&T Security Hole

6/11/2010
The recent revelation that over 100,000 iPad users had their email and account information exposed to hackers due to a mistake by AT&T made a lot of news this week and caused no small amount of embarrassment for AT&T and Apple. Bu the big news isn't the security failure itself, it's the reminder that in the modern world of cloud computing, security goes well beyond personal devices.

Post a Comment
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Bug Hunting Paves Path to Infosec Careers
Kelly Sheridan, Staff Editor, Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20127
PUBLISHED: 2018-12-13
An issue was discovered in zzzphp cms 1.5.8. del_file in /admin/save.php allows remote attackers to delete arbitrary files via a mixed-case extension and an extra '.' character, because (for example) "php" is blocked but path=F:/1.phP. succeeds.
CVE-2018-20128
PUBLISHED: 2018-12-13
An issue was discovered in UsualToolCMS v8.0. cmsadmin\a_sqlback.php allows remote attackers to delete arbitrary files via a backname[] directory-traversal pathname followed by a crafted substring.
CVE-2018-20129
PUBLISHED: 2018-12-13
An issue was discovered in DedeCMS V5.7 SP2. uploads/include/dialog/select_images_post.php allows remote attackers to upload and execute arbitrary PHP code via a double extension and a modified ".php" substring, in conjunction with the image/jpeg content type, as demonstrated by the filena...
CVE-2018-6706
PUBLISHED: 2018-12-12
Insecure handling of temporary files in non-Windows McAfee Agent 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows an Unprivileged User to introduce custom paths during agent installation in Linux via unspecified vectors.
CVE-2018-6705
PUBLISHED: 2018-12-12
Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions.