News & Commentary

Content tagged with Compliance posted in October 2006
HSPD-12's Toothless Deadline
News  |  10/27/2006  | 
US federal government's mandate for physical and logical security plagued by confusion, lack of funding
Mending Holes in the Blogosphere
News  |  10/27/2006  | 
Free Vox blogging service controls JavaScript, lets bloggers set privacy controls
Microsoft Promises Open Email Security
News  |  10/23/2006  | 
Microsoft pulled its Sender ID email authentication protocol under its OSP program to promote development of the once-controversial spec
Phishers' Catch: Better Than Expected
News  |  10/19/2006  | 
A new study from the University of Indiana indicates that phishers are more successful at catching users than most industry estimates suggest
ISPs Plan Security Push
News  |  10/18/2006  | 
New opportunities, public criticism drive service providers to develop more comprehensive security services
CSRF Vulnerability: A 'Sleeping Giant'
News  |  10/17/2006  | 
A mostly unknown Web vulnerability called Cross-Site Request Forgery could be the next attack vector on your Website
Power Pay
News  |  10/13/2006  | 
As the 2006 holiday season looms, retailers consider bypassing credit cards in favor of more secure online payment options
Anti-Malware Tools Trip Up IE7 Install
News  |  10/13/2006  | 
Temporarily disable your anti-malware apps before installing new Internet Explorer, says Microsoft
A-Listing Your Apps
News  |  10/12/2006  | 
Enterprises enlist app whitelisting to combat malware and unauthorized tools, but the approach has a dark side
Low-Cost PCs Pose Risk
News  |  10/9/2006  | 
Benefactors look to secure millions of identical computers to be unleashed in One Laptop Per Child initiative
Diebold Disses Democracy
News  |  10/9/2006  | 
Technologists may be surprised by how far things can get off track when the law embraces bad security ideas for no apparent reason
A Secure Channel for Customers
News  |  10/6/2006  | 
A startup is developing the means to bypass phishers and hackers with a secure link to clients


'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12692
PUBLISHED: 2018-06-23
TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the wps_setup_pin parameter to /data/wps.setup.json.
CVE-2018-12693
PUBLISHED: 2018-06-23
Stack-based buffer overflow in TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to cause a denial of service (outage) via a long type parameter to /data/syslog.filter.json.
CVE-2018-12694
PUBLISHED: 2018-06-23
TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote attackers to cause a denial of service (reboot) via data/reboot.json.
CVE-2018-12695
PUBLISHED: 2018-06-23
mao10cms 6 allows XSS via the m=bbs&a=index page.
CVE-2018-12696
PUBLISHED: 2018-06-23
mao10cms 6 allows XSS via the article page.