News & Commentary

Content tagged with Compliance posted in December 2009
Twitter Acquires GeoAPI Creator Mixer Labs
News  |  12/24/2009  | 
Software allows users to map their Twitter posts to specific locations, though some worry about privacy
Smartphone Security Startup Offers Free Beta
News  |  12/21/2009  | 
Product to mix lightweight mobile client with cloud-based security, backup, and anti-theft features
Product Watch: IBM Replaces Passwords With Palm-Vein Biometrics In Single Sign-On
News  |  12/17/2009  | 
Fujitsu's PalmSecure LOGONDIRECTOR is integrated with IBM Tivoli Access Manager for Single Sign-On
Shadowserver Global Data Shows 'No One Is Immune' From Conficker
Quick Hits  |  12/16/2009  | 
Russia, U.S., and Ukraine are home to highest numbers of Conficker-infected IP addresses
Old-School Botnet Still Thriving
Quick Hits  |  12/11/2009  | 
New Trend Micro report details how IRC-based SDBOT is going strong with a new mission
Droid Smartphone Hacked
News  |  12/10/2009  | 
Exploit lets phone users gain administrative root access to Google Android-based phones
Microsoft Targets Enterprise Endpoint With New Products
News  |  12/3/2009  | 
New Web gateway leverages the cloud, and remote access gateway draws on identity
US-CERT Warns Of VPN Attack That Bypasses Browser Security
Quick Hits  |  12/1/2009  | 
SSL VPN products from Cisco, Juniper Networks, SafeNet, and SonicWALL all vulnerable to attack that has "no solution"


New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17177
PUBLISHED: 2018-09-18
An issue was discovered on Neato Botvac Connected 2.2.0 and Botvac 85 1.2.1 devices. Static encryption is used for the copying of so-called "black box" logs (event logs and core dumps) to a USB stick. These logs are RC4-encrypted with a 9-character password of *^JEd4W!I that is obfuscated ...
CVE-2018-17178
PUBLISHED: 2018-09-18
An issue was discovered on Neato Botvac Connected 2.2.0 devices. They execute unauthenticated manual drive commands (sent to /bin/webserver on port 8081) if they already have an active session. Commands like forward, back, arc-left, arc-right, pivot-left, and pivot-right are executed even though the...
CVE-2018-11869
PUBLISHED: 2018-09-18
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of length validation check for value received from firmware can lead to buffer overflow in WMA handler.
CVE-2018-17176
PUBLISHED: 2018-09-18
A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. Manual control mode requires authentication, but once recorded, the authentication (always transmitted in cleartext) can be replayed to /bin/webserver on port 8081. There are no nonces, and timestamps are not checked at all.
CVE-2018-11852
PUBLISHED: 2018-09-18
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper check In the WMA API for the inputs received from the firmware and then fills the same to the host structure will lead to OOB write.