Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Epic Security #FAILS Of The Past 10 Years
Newest First  |  Oldest First  |  Threaded View
cyberpink
cyberpink,
User Rank: Strategist
6/9/2016 | 9:34:31 AM
Re: Anti virus
As crazy as it might sound, if you do not write the code, there is no telling what the code is actually doing in secret.  I try to pay attention to who wrote it, and what their reputation is.  If the company gives away apps geared toward businesses, and is also the same group responsible for distributing malware (which you can research on the internet), then there is a real good chance the free apps are not going to be friendly apps.  Also pay attention to where the data is stored.  If you use an app and the data is going to a server in one of the 26 malicious nation-states known for hacking, that would be a great app to avoid, no matter how many people like to use it.  I feel that more and more companies are going to move toward writing custom software solutions in the future. 
RajeevS411
RajeevS411,
User Rank: Apprentice
6/5/2016 | 8:15:56 PM
Anti virus
I just dont get it why people keep on creating these malwares to cause damage to others. Its just terrorism. Ive been buying software for almost every year. But since I purchased ESET Antivirus, I was stucked with it. I mean, I get satisfied with its perfomance. Lets see if it will cause me to buy more antivirus
paulno
paulno,
User Rank: Apprentice
5/19/2016 | 6:09:52 PM
I still predict more ones in the future with new technologies
Yes and it's not finished. Most of these fails are still current security shortfalls today and the article on Linkedin's hack highligh it perfectly. Hackers will still have fun next years as with the rise of new technologies, web languages and devices, IT vulnerabilities keep on emerging in the same time. We can't count on users to detect them, it's not their job. What can we do ? Prevent most of them, and try to react asap for the others... But let's be realistic : we'll never be abble to make a 0 fails world.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2993
PUBLISHED: 2022-12-09
There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.
CVE-2022-4390
PUBLISHED: 2022-12-09
A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do...
CVE-2022-45290
PUBLISHED: 2022-12-09
Kbase Doc v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /web/IndexController.java.
CVE-2022-41299
PUBLISHED: 2022-12-09
IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID...
CVE-2022-4170
PUBLISHED: 2022-12-09
The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.