News & Commentary

Content tagged with Compliance posted in November 2006
New Threats Loom for 2007
News  |  11/30/2006  | 
Password-stealing sites, video malware, and a parasitic comeback top McAfee's list of predicted threats for new year
The 10 Most Overlooked Aspects of Security
News  |  11/29/2006  | 
Think your organization has all its security bases covered? You might think twice after checking out this list
Banking on Security
News  |  11/29/2006  | 
No tellers were harmed, no cash was removed... This social engineer was after logins and passwords
Where the Bugs Are
News  |  11/28/2006  | 
New data from White Hat reveals vulnerabilities in major Web-based applications
The End of Password Post-Its
News  |  11/22/2006  | 
Milliman's new federated identity management architecture protects user IDs, simplifies client interaction
The 10 Most Dangerous Things Users Do Online
News  |  11/17/2006  | 
If your end users only knew how much damage they could cause when they - well, maybe you should send them this article
Study: SQL Server Is Safest DB
News  |  11/16/2006  | 
Research finds significantly fewer vulnerabilities in SQL Server database than in Oracle
Ex-IT Chief Busted for Hacking
News  |  11/16/2006  | 
Could former security-privileged employees be targeting your environment as well?
The Truth About User Privileges
News  |  11/8/2006  | 
Denying your users full system privileges is in style
Attention, Online Shoppers: Where R U?
News  |  11/7/2006  | 
Security worries are slowing online shopping and banking, but consumers should be afraid of that POS instead, Gartner says
NAC-in-the-Box, Jump Up
News  |  11/6/2006  | 
Vernier, ConSentry launch improvements to their Network Access Control appliances
Built-in Headaches
News  |  11/1/2006  | 
PC hardware vendors are building security capabilities into their systems, but those features may present compatibility problems for IT
Kernel Bugs Come Marchin' In
News  |  11/1/2006  | 
Day one of the Month of Kernel Bugs is under way, and an Apple Mac OS X and wireless exploit kicks it off


'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12716
PUBLISHED: 2018-06-25
The API service on Google Home and Chromecast devices before mid-July 2018 does not prevent DNS rebinding attacks from reading the scan_results JSON data, which allows remote attackers to determine the physical location of most web browsers by leveraging the presence of one of these devices on its l...
CVE-2018-12705
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have XSS via the SSID (it is validated only on the client side).
CVE-2018-12706
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have a Buffer Overflow via a long Authorization HTTP header.
CVE-2018-12714
PUBLISHED: 2018-06-24
An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial o...
CVE-2018-12713
PUBLISHED: 2018-06-24
GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was ...