News & Commentary

Content tagged with Compliance posted in December 2010
Happy Holidays From Dark Reading
Quick Hits  |  12/23/2010  | 
Dark Reading staff takes brief hiatus; rebooting on Jan. 3
Password Diversity Urged In Wake Of Gawker Attack
News  |  12/17/2010  | 
One of biggest threats is reuse of hacked credentials on other websites
Compliance Means Getting A Handle On Insider Threats
News  |  12/16/2010  | 
When the auditors come, they'll be looking at your internal controls as well as your external defenses. Will you be ready?
Tech Insight: Two-Factor Authentication Alone Isn't Enough
News  |  12/10/2010  | 
Protecting online banking customers entails a more holistic approach by banks that includes risk-based authentication, browser protection, and fraud monitoring
Holiday Rush Leaves Smartphones At Risk
Quick Hits  |  12/9/2010  | 
Symantec study finds smartphone users planning to use their mobile devices for work, personal purposes during the holidays
Google Ready To Test Chrome OS
News  |  12/9/2010  | 
Program participants will receive a Google-commissioned netbook, designated Cr-48, with Chrome OS installed
Endpoints More At Risk Than Ever, Study Says
Quick Hits  |  12/8/2010  | 
Threat of malware, application vulnerabilities continues to increase, Ponemon finds
Lost Laptops Cost Companies Billions, Study Says
Quick Hits  |  12/3/2010  | 
Cost of data exposure dwarfs the cost of lost equipment, according to Intel/Ponemon report


'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
6 CISO Resolutions for 2019
Ericka Chickowski, Contributing Writer, Dark Reading,  12/10/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: New camera 2FA closed loop!
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20059
PUBLISHED: 2018-12-11
jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE.
CVE-2018-20056
PUBLISHED: 2018-12-11
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. There is a stack-based buffer overflow allowing remote attackers to execute arbitrary code without authentication via the goform/formLanguageChange currTime parameter.
CVE-2018-20057
PUBLISHED: 2018-12-11
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. goform/formSysCmd allows remote authenticated users to execute arbitrary OS commands via the sysCmd POST parameter.
CVE-2018-20058
PUBLISHED: 2018-12-11
In Evernote before 7.6 on macOS, there is a local file path traversal issue in attachment previewing, aka MACOSNOTE-28634.
CVE-2018-20050
PUBLISHED: 2018-12-10
Mishandling of an empty string on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via the ONVIF GetStreamUri method and GetVideoEncoderConfigurationOptions method.