Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
REISEN1955
71%
29%
REISEN1955,
User Rank: Ninja
4/19/2019 | 12:58:35 PM
Keep Politics out of this forum
Like Linkedin ---- political articles do NOT belong here. 
LANCELOTT69
85%
15%
LANCELOTT69,
User Rank: Apprentice
4/19/2019 | 1:25:40 PM
Re: Keep Politics out of this forum
I know the tempation to allow your politics to bleed into your business is powerful, but please stop. This is not the place for it. 
REISEN1955
75%
25%
REISEN1955,
User Rank: Ninja
4/19/2019 | 1:28:32 PM
Re: Keep Politics out of this forum
Agree - an article on HOW they did it might be more interesting.  
Kelly Jackson Higgins
55%
45%
Kelly Jackson Higgins,
User Rank: Strategist
4/19/2019 | 2:00:01 PM
Re: Keep Politics out of this forum
@REISEN1955, I'm not sure I understand your comment on the article as "political." This is reporting on a key cybersecurity element/finding in the Mueller report. Dark Reading has been covering the Russian hacking of the DNC and DCCC, & Podesta, etc., issue for some time, as well as the surrounding election security issues. 
VectorVortec
75%
25%
VectorVortec,
User Rank: Strategist
4/20/2019 | 1:40:03 PM
Re: Keep Politics out of this forum
If you ever handled website administration, you would know that Russian bots attack every 3 to 4 seconds, at least. So to state that there was an attempt on HRC's computer is not news to anyone who has ever worked in this area.
RonR726
60%
40%
RonR726,
User Rank: Strategist
4/22/2019 | 8:41:51 AM
FACTS don't matter
This board does not support FACTS uncovered by Bill Binney, well-known NSA whistleblower, but rather supports a make-believe "the Russians did it" fairy tale told by the deep state who attempted to overthrow a duly elected President of the United States. Shame on you!

Ron
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
4/22/2019 | 9:22:03 AM
Re: FACTS don't matter
The Russians did alot on the 2016 election and that would be ineteresting aside from the stupid Facbook campaign (see Zucky boy for that mess among many others) but this article has a political bent which should really be kept somewhere else.  Linkedin was getting political too at time and FB is of course a mess.  Just an attempt to keep the integrity and intellectual level of this fine discussion group on the up and up.  

It is also the TITLE of the essay that seems out of place.  Like COMPUTERS IN THE WORLD TRADE CENTER WERE SHIPPED TO ISRAEL HOURS BEFORE SEPTEMBER 11 ATTACK.

 
bwilkes8@gmail.com
100%
0%
[email protected],
User Rank: Moderator
4/22/2019 | 9:56:32 AM
Russia Hacked Clinton's Computers Five Hours After Trump's Call
This article should address

- Use of spearphishing

- Lack of IT security training

- Patterns of hacking

However, its title is inaccurate based upon the report's content and its subject matter tarnishes this sites creditbility. 
PanamaVet
100%
0%
PanamaVet,
User Rank: Strategist
4/23/2019 | 8:45:01 AM
Re: Russia Hacked Clinton's Computers Five Hours After Trump's Call
 Well said.  The content of the article does not validate the headline.

I believe they underestimate their audience.

I fully support their rights to free speech in the USA.

I am free to choose where I go for trustworth information security content.

I dropped an email to a friend of mine in sales at Cylance asking if they know about this editorial shift at DarkReading.  I know they take their marketing strategy seriously.  I included a link to this article. 

 

I have seen other technology publishers make the switch to politics.  I don't want my friends to suffer because of it.

The problem in this case is not just politics.  It is the inability to draw a reliable conclusion that includes the editorial hierarchy.  It is sensational misinformation on the front page.

 

 

 

 

 

 

 

 
AndrewfOP
100%
0%
AndrewfOP,
User Rank: Moderator
4/23/2019 | 9:45:25 AM
Poor Editorial Choice
All news organization engaged in attention-grabbing headlines.  This article is not only the norm, but also pushes the boundary.  The relevant content for the headline did not appear until the last paragraph and even then, it barely has more information than the headline.  The headline description at most should be part of the lead sentence, and regardless of the headline problem, there should be more elaboration of the five hour hack.  Terrible execution overall.

 
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16060
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI.
CVE-2018-16061
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.
CVE-2021-27561
PUBLISHED: 2021-10-15
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
CVE-2020-4951
PUBLISHED: 2021-10-15
IBM Cognos Analytics 11.1.7 and 11.2.0 contains locally cached browser data, that could allow a local attacker to obtain sensitive information.
CVE-2021-28021
PUBLISHED: 2021-10-15
Buffer overflow vulnerability in function stbi__extend_receive in stb_image.h in stb 2.26 via a crafted JPEG file.