Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
6 Security Tips Before You Put a Digital Assistant to Work
Oldest First  |  Newest First  |  Threaded View
jgallman
50%
50%
jgallman,
User Rank: Apprentice
2/8/2019 | 9:23:31 AM
Grammar please!
You lose me when the very first sentence is as poorly constructed as this one is.  Her should be their.
t_madison
50%
50%
t_madison,
User Rank: Apprentice
2/18/2019 | 3:26:51 AM
Good advice
Thanks for the advice, it is very useful.
NathanDavidson
50%
50%
NathanDavidson,
User Rank: Apprentice
2/19/2019 | 1:50:29 AM
Beware the Coming of the Robot Age
I would g et an Alexa or AI for the house just to test it out and have a little bit of fun with it. But I'm also a little worried what might happen if I really leave the management of my house up to this little device. It's not so much about the security of it, but about the age of the robots and all that! Haha!
michaelmaloney
50%
50%
michaelmaloney,
User Rank: Apprentice
2/21/2019 | 1:24:26 AM
Too complacent too dangerous
Sometimes consumers are just too complacent about the ready benefits that are being laid out in front of them. Every individual surely knows how to take advantage of each and every single one of them without considering the possible implications underneath. They are willing to forgo any potential risks because somehow the era of IT today has given them the trust they need.


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18923
PUBLISHED: 2019-11-13
Insufficient content type validation of proxied resources in go-camo before 2.1.1 allows a remote attacker to serve arbitrary content from go-camo's origin.
CVE-2010-4664
PUBLISHED: 2019-11-13
In ConsoleKit before 0.4.2, an intended security policy restriction bypass was found. This flaw allows an authenticated system user to escalate their privileges by initiating a remote VNC session.
CVE-2010-4817
PUBLISHED: 2019-11-13
pithos before 0.3.5 allows overwrite of arbitrary files via symlinks.
CVE-2013-3097
PUBLISHED: 2019-11-13
Unspecified Cross-site scripting (XSS) vulnerability in the Verizon FIOS Actiontec MI424WR-GEN3I router.
CVE-2013-3366
PUBLISHED: 2019-11-13
Undocumented TELNET service in TRENDnet TEW-812DRU when a web page named backdoor contains an HTML parameter of password and a value of j78G�DFdg_24Mhw3.