Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Cartoon: Connected Car Security
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
lakers85
lakers85,
User Rank: Strategist
3/6/2019 | 9:04:44 AM
Shotgun
Ummmm, I called shotgun...
mhhf1ve
mhhf1ve,
User Rank: Apprentice
3/5/2019 | 1:11:29 PM
There is no car...
Where we're going, there are no roads...
WallyDragon
WallyDragon,
User Rank: Strategist
3/1/2019 | 6:29:57 AM
Let me just check...
...is this a secure line I'm on?
Len Sebesta
Len Sebesta,
User Rank: Strategist
2/27/2019 | 12:15:09 PM
Re: Car or no car
I with you on that one Joe.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
2/23/2019 | 11:03:19 PM
Car or no car
The "connected car" aspect didn't even strike me as first, literally. I took this as a figurative representation of all tech/digital-transformation initiatives!
MarcM
MarcM,
User Rank: Strategist
2/21/2019 | 7:55:30 AM
Business drag
We won't cut you loose as long as you don't slow us down!
acampbell448
acampbell448,
User Rank: Ninja
2/20/2019 | 11:01:53 AM
Move Fast
Security?   Our motto is Move Fast and Break things.
jrig1842
jrig1842,
User Rank: Strategist
2/20/2019 | 9:02:48 AM
Security Clearance
It's clear even Security is not sure what to do for self driving cars 
REISEN1955
REISEN1955,
User Rank: Ninja
2/20/2019 | 7:57:47 AM
Re: New Cartoon! Check it out...
Dang - he really wants to be serious about websurfing!
TheVampireO
TheVampireO,
User Rank: Strategist
2/15/2019 | 3:02:30 PM
Forethought
I know I'm just the intern, but I don't think you put much forethought into security...
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-33187
PUBLISHED: 2022-12-09
Brocade SANnav before v2.2.1 logs usernames and encoded passwords in debug-enabled logs. The vulnerability could allow an attacker with admin privilege to read sensitive information.
CVE-2022-38765
PUBLISHED: 2022-12-09
Canon Medical Informatics Vitrea Vision 7.7.76.1 does not adequately enforce access controls. An authenticated user is able to gain unauthorized access to imaging records by tampering with the vitrea-view/studies/search patientId parameter.
CVE-2022-41947
PUBLISHED: 2022-12-08
DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. Through various features of DHIS2, an authenticated user may be able to upload a file which includes embedded javascript. The user could then potentially trick another authenticated use...
CVE-2022-41948
PUBLISHED: 2022-12-08
DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. Affected versions are subject to a privilege escalation vulnerability. A DHIS2 user with authority to manage users can assign superuser privileges to themself by manually crafting an HT...
CVE-2022-23469
PUBLISHED: 2022-12-08
Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header a...