Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

US Border Policy Shifts May Drive Changes in Laptop Security
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
User Rank: Apprentice
2/23/2019 | 1:07:20 PM
Re: Great
It is basic that we read blog entry painstakingly. I am as of now done it and find this post is truly astonishing. Bruce
User Rank: Apprentice
10/4/2018 | 6:39:26 AM
Re: Great
yeah it's great
User Rank: Apprentice
6/29/2018 | 9:29:18 AM
Thanks a lot
Thanks for the great article!


User Rank: Apprentice
4/27/2018 | 5:29:35 AM
thanks for sharing such a great information...
User Rank: Apprentice
4/7/2017 | 3:20:23 AM
Good reading post.
Hi Ericka,

This is a great reading post. I've learn many new things here. Thank for share it here!
User Rank: Apprentice
4/7/2017 | 3:18:20 AM
Good reading post
Hi Ericka,

This is a great reading article. I've learn many new things from your post. Thank for your time.
User Rank: Black Belt
4/6/2017 | 11:48:04 PM
Amazing article.
Really amazing article, although I am a newbie, but you shared me the best messages. Ericka, looking forward to your update :)
User Rank: Black Belt
4/6/2017 | 7:58:19 PM
Great article.
Hi Ericka, every time I back for your article, I got many much very useful messages and knowledge from your posts, in this great platform, you shared me so many much information and kind information, haha, i am sorry i am not the expert of the subject, but I interest in it :) Looking forward to your great update again, thanks much!
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
4/6/2017 | 4:19:34 PM
I'm with George Wrenn on this.  It'll force companies to do what they already should be doing.

At the same time, however, while I appreciate the security risks of people hacking into on board systems, I am not convinced this is the best way to solve the problem (especially because what can be done on a laptop can be done on a jailbroken mobile device).  I'd rather see better InfoSec in this environment, even to the point of lack of connectivity.  If the cost is no Wi-Fi for the two to four hours it takes to get to Atlanta, that to me is better than "you can't bring your laptop/device."
User Rank: Black Belt
4/5/2017 | 10:54:23 PM
Amazing and professional article.
I really appreciate your great article here, very informative and useful, I am a newbie here, but I am very glad and pleasure to get your amazing post here, have you updated any articles else? I will be very glad to enjoy again...
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file