Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Privacy in a Pandemic: What You Can (and Can't) Ask Employees
Newest First  |  Oldest First  |  Threaded View
AntonioMochilas
50%
50%
AntonioMochilas,
User Rank: Apprentice
4/8/2020 | 6:43:03 AM
Totally agree
We should take care about what we said to our employeers or chiefs
Alexaex
50%
50%
Alexaex,
User Rank: Apprentice
3/27/2020 | 6:47:18 AM
GREAT ARTICLE
Liked this one. Thank you a lot.
Recently I've heard of some unpleasant situations in companies (dealing with the virus). Some people make scenes as if they're ill, saying that a company is guilty. Firms got fines( 
zentrusted
50%
50%
zentrusted,
User Rank: Apprentice
3/25/2020 | 2:42:45 PM
VERY HELPFUL
Very helpful post, a lot of information was new to me. Some very interesting insights as well (such as the contradiction in ADA vs. CDC guidance on taking temperature). Thanks!


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: It's the latest version of antivirus.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12607
PUBLISHED: 2020-06-02
An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a us...
CVE-2020-13764
PUBLISHED: 2020-06-02
common.php in the Gravity Forms plugin before 2.4.9 for WordPress can leak hashed passwords because user_pass is not considered a special case for a $current_user->get($property) call.
CVE-2020-13760
PUBLISHED: 2020-06-02
In Joomla! before 3.9.19, missing token checks in com_postinstall lead to CSRF.
CVE-2020-13761
PUBLISHED: 2020-06-02
In Joomla! before 3.9.19, lack of input validation in the heading tag option of the "Articles - Newsflash" and "Articles - Categories" modules allows XSS.
CVE-2020-13762
PUBLISHED: 2020-06-02
In Joomla! before 3.9.19, incorrect input validation of the module tag option in com_modules allows XSS.