Slideshows

Content posted in November 2010
Slide Show: DDoS With The Slow HTTP POST Attack
Slideshows  |  11/29/2010  | 
Researchers demonstrate attack that picks on inherent flaw in HTTP
5 Airport Body Scanner Patents Stripped Down
Slideshows  |  11/29/2010  | 
Here's a deep dive on five patents applying X-ray backscatter technology to airport contraband detection. These screening machines have been much in the news recently, amid controversy regarding both their effectiveness and the amount of radiation exposure to which travelers are subjected. The patents we'll look at are from prime players in the airport body scanner field. This list is led by Rapiscan Systems Inc. , of Torrance, Calif., which in 2009 won the TSA contract to supply whole-body imag
Slide Show: Extreme And Alternative Authentication Methods
Slideshows  |  11/16/2010  | 
Passwords are the weakest link in access control, but there are plenty of other, less-traveled options for authentication
Slideshow: Ten Free Security Monitoring Tools
Slideshows  |  11/8/2010  | 
Freebie apps can save you money, but deployment may not be so free
How Firesheep Can Hijack Web Sessions
Slideshows  |  11/2/2010  | 
Firesheep is a Firefox extension used to hijack web sessions, usually used over WiFi networks. Firesheep doesn't steal usernames and passwords, instead it copies session cookies used on authenticated websites. These are then used to impersonate the hijacked connection. Session hijacking, or sidejacking is a well known problem, ranking 3rd on OWASP's (Open Web Application Security Project) Top 10 Application Security Risk list. Attackers using Firesheep just need access to network traffic -- such


Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
Election Websites, Backend Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10510
PUBLISHED: 2018-08-15
A Directory Traversal Remote Code Execution vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to execute arbitrary code on vulnerable installations.
CVE-2018-10511
PUBLISHED: 2018-08-15
A vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to conduct a server-side request forgery (SSRF) attack on vulnerable installations.
CVE-2018-10512
PUBLISHED: 2018-08-15
A vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to manipulate a reverse proxy .dll on vulnerable installations, which may lead to a denial of server (DoS).
CVE-2018-8753
PUBLISHED: 2018-08-15
The IKEv1 implementation in Clavister cOS Core before 11.00.11, 11.20.xx before 11.20.06, and 12.00.xx before 12.00.09 allows remote attackers to decrypt RSA-encrypted nonces by leveraging a Bleichenbacher attack.
CVE-2018-9129
PUBLISHED: 2018-08-15
ZyXEL ZyWALL/USG series devices have a Bleichenbacher vulnerability in their Internet Key Exchange (IKE) handshake implementation used for IPsec based VPN connections.