Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Compliance posted in March 2007
Cisco's NAC Gets Hacked
News  |  3/30/2007  | 
German security experts develop tool that spoofs legitimate client and fools Cisco servers into allowing network access
Eight Faces of a Hacker
News  |  3/29/2007  | 
Profilers decipher who they are, why they do it as new subcategories start to emerge
Killer Combo: XSS + CSRF
News  |  3/29/2007  | 
Researchers mix cross-site scripting and cross-site request forgery together in a deadly cocktail
I've Been Chipped
News  |  3/28/2007  | 
The technology behind my new RFID-equipped US passport has been thought out remarkably well
Hacking the Car Navigation System
News  |  3/28/2007  | 
Italian researchers reveal attack methods on RDS-TMC navigation systems
New RFID Attack Opens the Door
News  |  3/23/2007  | 
Proof-of-concept lets intruder gain entry into the building by faking RFID readers with SQL injection
Oracle Sues SAP for Espionage
News  |  3/22/2007  | 
Database giant alleges SAP grabbed thousands of documents using IDs of defecting Oracle customers
Tools Fight Forensics
News  |  3/19/2007  | 
Anti-forensics tools are giving attackers more cover, InfoSec World speaker says
Risk Factors
News  |  3/19/2007  | 
Microsoft badly misfires with its plan to treat the same risks differently in Windows XP, Vista
Secure Stage
News  |  3/16/2007  | 
IT has to get certain details right if they expect users to take security seriously
Oracle Preps Security Features for 11g
News  |  3/16/2007  | 
Enhancements to database will focus on encryption, compliance
Seven Steps to Safer WiFi
News  |  3/14/2007  | 
Using public WiFi can be like the wireless Wild West. Here's how to tame (and secure) your experience
Smart USBs Gone Bad
News  |  3/13/2007  | 
Tapping the AutoRun feature of many PCs means they can be hacked using smart USB drives
HID Lists RFID Security Steps
News  |  3/13/2007  | 
In open letter to its customers, RFID vendor HID Global stands by its products, offers protective measures
Burger, Fries & Security
News  |  3/12/2007  | 
Wendy's franchisee outsources Internet access, security of its seven stores to BHI
If Data Were Like Cash
News  |  3/12/2007  | 
Then it wouldn't be acceptable to leave it in an employee's car, or worse, lose it
Small Businesses: Overconfident on Security
News  |  3/9/2007  | 
Most mom-and-pops think they've got customers' backs, but study suggests they may be big fat targets
A Good, Unified Theory
News  |  3/9/2007  | 
Don't wait for identity management's grand schemes to get aligned before diving into the maw
Banks, Retailers Seek to Regain User Trust
News  |  3/8/2007  | 
But new research suggests the trust battle is mostly uphill
Novell, Honeywell Get Physical
News  |  3/7/2007  | 
Vendors plan to unveil logical-physical security solutions this month
Leak Hunters
News  |  3/6/2007  | 
Cyber researchers prowl the Web for evidence of misdoings by employees, hackers, or competitors
Q&A: What to Do About Web 2(.0)
News  |  3/6/2007  | 
In an exclusive interview, Imperva co-founder talks Web 2.0 security risks, protection strategies, and how end-user education is a waste of time
Identifying With DHS
News  |  3/5/2007  | 
Department of Homeland Security struck a balance between caution and flexibility in its personal ID plan
Deep Threat
News  |  3/5/2007  | 
Insiders pose increasing danger to safety of corporate data, according to two new studies published today
Security's Three Deadly Sins
News  |  3/2/2007  | 
It all boils down to sloth, hubris, and greed
Vint Cerf: Father Knows Best
News  |  3/2/2007  | 
Internet founder talks actors, Googlers, and hackers


Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23901
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
CVE-2020-17532
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd