Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Privacy

News & Commentary
Apple Issues Security Updates
Dark Reading Staff, Quick Hits
Vulnerabilities found in three most recent versions of macOS.
By Dark Reading Staff , 11/13/2020
Comment0 comments  |  Read  |  Post a Comment
FTC Announces Consent Agreement With Zoom
Dark Reading Staff, Quick Hits
The agreement covers Zoom's misleading statements on security for its audio and video calling.
By Dark Reading Staff , 11/9/2020
Comment0 comments  |  Read  |  Post a Comment
Data Privacy Gets Solid Upgrade With Early Adopters
Robert Lemos, Contributing WriterNews
The United Kingdom and the regional government of Flanders kick off four pilots of the Solid data-privacy technology from World Wide Web inventor Tim Berners-Lee, which gives users more control of their data.
By Robert Lemos Contributing Writer, 11/9/2020
Comment1 Comment  |  Read  |  Post a Comment
How to Increase Voter Turnout & Reduce Fraud
Husayn Kassai, Co-Founder and CEO, OnfidoCommentary
Digital identity verification has advanced, both technologically and legislatively. Is it the answer to simpler, safer voting?
By Husayn Kassai Co-Founder and CEO, Onfido, 10/29/2020
Comment0 comments  |  Read  |  Post a Comment
Ubiq Rolls Out Encryption-as-a-Service Platform Aimed at Developers
Robert Lemos, Contributing WriterNews
A few lines of code and two API calls is all that it takes for developers to add encryption to their applications, startup says.
By Robert Lemos Contributing Writer, 10/21/2020
Comment0 comments  |  Read  |  Post a Comment
Coalition Pokes Five Eyes on Call for Backdoors
Dark Reading Staff, Quick Hits
The Five Eyes international law enforcement group had called for implementing backdoors for law enforcement in all encryption implementations.
By Dark Reading Staff , 10/13/2020
Comment0 comments  |  Read  |  Post a Comment
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open RavenCommentary
If data security were a student, its report card would read "Not performing to potential." Here's why.
By Dave Cole Cofounder and CEO, Open Raven, 10/13/2020
Comment0 comments  |  Read  |  Post a Comment
Biometric Data Collection Demands Scrutiny of Privacy Law
Kelly Sheridan, Staff Editor, Dark ReadingNews
An IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it.
By Kelly Sheridan Staff Editor, Dark Reading, 10/2/2020
Comment0 comments  |  Read  |  Post a Comment
'Father of Identity Theft' Sentenced to 207 Months
Dark Reading Staff, Quick Hits
James Jackson was convicted of mail fraud, aggravated identity theft, access device fraud, and theft of mail last year.
By Dark Reading Staff , 10/2/2020
Comment0 comments  |  Read  |  Post a Comment
Struggling to Secure Remote IT? 3 Lessons from the Office
Chris Hallenbeck, CISO for the Americas at TaniumCommentary
The great remote work experiment has exacerbated existing challenges and exposed new gaps, but there are things to be learned from office challenges.
By Chris Hallenbeck CISO for the Americas at Tanium, 9/17/2020
Comment0 comments  |  Read  |  Post a Comment
Simplify Your Privacy Approach to Overcome CCPA Challenges
Hilary Wandall, Senior Vice President, Privacy Intelligence and General Counsel at TrustArcCommentary
By building a privacy-forward culture from the ground up and automating processes, organizations can simplify their approach to privacy and be prepared for any upcoming regulations.
By Hilary Wandall Senior Vice President, Privacy Intelligence and General Counsel at TrustArc, 9/15/2020
Comment0 comments  |  Read  |  Post a Comment
Two Years on from GDPR: Has It Driven Growth in Cybersecurity Insurance?
IFSEC Global, StaffNews
Whilst GDPR has put the spotlight on data privacy and cyber issues, there are other more prominent trends that are driving a greater take-up of cyber insurance, says Ben Maidment, Class Underwriter Cyber, Physical & Technology at Brit Insurance.
By IFSEC Global Staff, 9/10/2020
Comment0 comments  |  Read  |  Post a Comment
VPNs: The Cyber Elephant in the Room
Brigadier General (Ret) Gregory J. Touhill, President, AppGate Federal DivisionCommentary
While virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.
By Brigadier General (Ret) Gregory J. Touhill President, AppGate Federal Division, 9/8/2020
Comment2 comments  |  Read  |  Post a Comment
8 Frequently Asked Questions on Organizations' Data Protection Programs
Bernard Woo, Senior Director Analyst, GartnerCommentary
Adherence to data protection regulations requires a multidisciplinary approach that has the commitment of all employees. Expect to be asked questions like these.
By Bernard Woo Senior Director Analyst, Gartner, 9/8/2020
Comment0 comments  |  Read  |  Post a Comment
Warner Music Group Admits Breach
Dark Reading Staff, Quick Hits
The months-long breach hit financial details for customers.
By Dark Reading Staff , 9/4/2020
Comment0 comments  |  Read  |  Post a Comment
Don't Forget Cybersecurity on Your Back-to-School List
Jeff Wilbur, Senior Director, Online Trust, the Internet SocietyCommentary
School systems don't seem like attractive targets, but they house lots of sensitive data, such as contact information, grades, health records, and more.
By Jeff Wilbur Senior Director, Online Trust, the Internet Society, 9/2/2020
Comment1 Comment  |  Read  |  Post a Comment
ISO 27701 Paves the Way for a Strategic Approach to Privacy
Arti Lalwani, ISO Practice Lead, A-LIGNCommentary
As the first certifiable international privacy management standard, ISO 27701 is a welcome addition to the existing set of common security frameworks.
By Arti Lalwani ISO Practice Lead, A-LIGN, 9/1/2020
Comment0 comments  |  Read  |  Post a Comment
Banks and the New Abnormal
Matt Deres, SVP, Chief Information Officer, Rocket SoftwareCommentary
Banks have hesitated to adopt many strong security practices, and for understandable reasons. But now is the time to be bold.
By Matt Deres SVP, Chief Information Officer, Rocket Software, 8/20/2020
Comment2 comments  |  Read  |  Post a Comment
With iOS's Privacy Nutrition Label, Apple Upstages Regulators
Heather Federman, VP of Privacy & Policy at BigIDCommentary
New iOS privacy features require developers to disclose what data they're collecting, how they're using it, and with whom they share it.
By Heather Federman VP of Privacy & Policy at BigID, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
EU-US Privacy Shield Dissolution: What Happens Next?
Sam Curry, CSO, CybereasonCommentary
In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.
By Sam Curry CSO, Cybereason, 8/11/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29378
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. It is possible to elevate the privilege of a CLI user (to full administrative access) by using the password [email protected]#y$z%x6x7q8c9z) for the e...
CVE-2020-29379
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. During the process of updating the firmware, the update script starts a telnetd -l /bin/sh process that does not require authentication for TELNET access.
CVE-2020-29380
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. TELNET is offered by default but SSH is not always available. An attacker can intercept passwords sent in cleartext and conduct a man-in-...
CVE-2020-29381
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. Command injection can occur in "upload tftp syslog" and "upload tftp configuration" in the CLI via a crafted filename...
CVE-2020-29382
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. A hardcoded RSA private key (specific to V1600D, V1600G1, and V1600G2) is contained in the firmware images.