Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
8 Most Overlooked Security Threats
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
JackieHorn09
50%
50%
JackieHorn09,
User Rank: Apprentice
1/7/2019 | 9:16:51 PM
Newbie
I am a 33-year-old female, with no military affiliation just getting started with my bachelor's in cybersecurity.  Any thoughts or help to get started? Will my age and the fact that I have no prior military hurt me? 
EricT981
50%
50%
EricT981,
User Rank: Author
6/13/2017 | 2:57:17 PM
Re: Awareness training
It's easy to get excited about 0-days and network security because technology solutions are easier than human solutions. Education is important, but so is accountability: Security teams need to start bringing other teams (infrastructure, dev) into the fray.
stevejennings
50%
50%
stevejennings,
User Rank: Strategist
6/7/2017 | 9:00:53 AM
Re: Malvertising
64% of Americans work from home? Really? Perhaps you meant 64% of IT professionals? And even that sounds high.
ebyjeeby
100%
0%
ebyjeeby,
User Rank: Strategist
6/6/2017 | 2:04:45 PM
Re: 8 Most Overlooked Security Threats
z/OS and NSK are very secure, nothing like *nix and Windows.
tadwhitaker
100%
0%
tadwhitaker,
User Rank: Author
6/5/2017 | 2:48:12 PM
IOT
The threat of connected devices can't be overstated enough. It needs to be the next phishing, in terms of public awareness. Particularly as voice-activated assistants are widely adopted.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
6/2/2017 | 4:33:51 PM
Re: Awareness training
@Dr.T: I'm not even so sure about the "more than ever"... Hackers have long known that social engineering is where it's at.  And Kevin Mitnick taught us this through his own exploits back in the day.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/2/2017 | 4:32:13 PM
Re: Malvertising
@Dr.T: Incorrect. But most if not all video would be disabled. And then for the sites you explicitly trust, you could enable as needed.
ronbo1963
100%
0%
ronbo1963,
User Rank: Apprentice
5/31/2017 | 11:54:53 AM
Re: 8 Most Overlooked Security Threats
Spot on. I started my IT career working in a IBM Mainframe environment. The economy of scale of going back to that platform would be a tremendous benefit to any corporate enterprise. When the top 50 banks in the world rely on z/OS as their primary server environment what do they know that the rest of the corporate world do not....... P.S. 35 years IT. Also performed the Common Criteria Evaluation of two to the z/OS security filters. Much more robust and safe than other platform implementations.....
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
5/30/2017 | 4:39:24 PM
Re: Awareness training
This is the bigger issue in security: Creating a culture of security.  Having the best security systems in the world technologically do little good if people are just willing to hand over login information, click on links willy-nilly, and let strangers into their datacenters.
tcritchley07
100%
0%
tcritchley07,
User Rank: Moderator
5/30/2017 | 2:23:39 PM
Re: 8 Most Overlooked Security Threats
I'm afraid all OSes are not the same. Windows is a ramshackle lash-up which changes every version and is wide open to abuse. z/OS is far more robust and defendable than Windows and is capable of protecting Linux running under it. The 3rd party apps that run with Windows to give the total internet environment were not designed together and are bolt-ons with the same potential for interference with each other and by the bad guys. We all know that certain apps will not coexist on Windows and some have brought my system down before I uninstalled them.

PS I am not an apprentice but have nearly 50 years in IT as practitioner latterly as an author.
Page 1 / 2   >   >>


Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17424
PUBLISHED: 2019-10-22
A stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file.
CVE-2019-16404
PUBLISHED: 2019-10-21
Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.
CVE-2019-17400
PUBLISHED: 2019-10-21
The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
CVE-2019-17498
PUBLISHED: 2019-10-21
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a ...
CVE-2019-16969
PUBLISHED: 2019-10-21
In FusionPBX up to 4.5.7, the file app\fifo_list\fifo_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.