News & Commentary

Content tagged with Compliance posted in February 2007
Government Targets Insider Threat
News  |  2/28/2007
Defense, Justice, and HUD developing new strategies for stopping internal security leaks
Black Hat Cancels RFID Demo
News  |  2/27/2007
Badge, smartcard patent holder threatens lawsuit over cloning presentation
A Virtual Post-It, Perhaps
News  |  2/26/2007
Keeping all those passwords straight - not to mention secure - can suck up a lot of brain power
Black Hats Focus on Apps
News  |  2/23/2007
DC convention shows security researchers are shifting away from network infrastructure - and toward applications
Top 10 Admin Passwords to Avoid
News  |  2/22/2007
Don't want hackers to guess the password for that critical server or application? Stay away from these
Cisco's Web Security Play
News  |  2/21/2007
Acquisition of Reactivity could pave way to network-based solutions for Web 2.0, SOA
VMs Create Potential Risks
News  |  2/21/2007
Convenient and efficient, virtual machines can also increase your security exposure
Insider Tries to Steal $400 Million at DuPont
News  |  2/16/2007
Unusual computer activity is tipoff in successful case against chemist who tried to steal intellectual property for his new employer
3G Card Secures Laptops
News  |  2/15/2007
3G cellular-based add-on secures data in the event of malware infection, laptop loss, or theft
Are 'Sealed' Websites Any Safer?
News  |  2/9/2007
Website seals are designed to make buyers feel safer. But are sites with seals really more secure?
IBM's Stealthy Security Play
News  |  2/8/2007
After being acquired by IBM in August, ISS is doubling in size, tripling its customer pipeline, and laying the groundwork for a major security push by Big Blue, top exec says
Microsoft Vision Raises Questions
News  |  2/6/2007
Past developments suggest that Microsoft's future security road may be a bumpy ride
NAC: Can't Get No Satisfaction
News  |  2/2/2007
Vendors prepare to shore up the shortcomings of network access control at RSA conference next week
EMC Kicks Off With Security
News  |  2/2/2007
'Robust' product refresh cycle begins, with RSA security built into Symmetrix
To Enter, Act Like Yourself
News  |  2/1/2007
Behavior-based biometrics to ID you by the way you speak, type, move your mouse, and more
Microsoft Debuts VPN Appliance
News  |  2/1/2007
SSL-based Intelligent Application Gateway is latest offering in its Forefront security product line
ID Management: A Matter of Entitlement
News  |  2/1/2007
The need for compliance is driving authorization, integration, and automation in identity management

Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
Microsoft Report Details Different Forms of Cryptominers
Kelly Sheridan, Staff Editor, Dark Reading,  3/13/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.