News & Commentary

Content tagged with Compliance posted in March 2007
Cisco's NAC Gets Hacked
News  |  3/30/2007  | 
German security experts develop tool that spoofs legitimate client and fools Cisco servers into allowing network access
Eight Faces of a Hacker
News  |  3/29/2007  | 
Profilers decipher who they are, why they do it as new subcategories start to emerge
Killer Combo: XSS + CSRF
News  |  3/29/2007  | 
Researchers mix cross-site scripting and cross-site request forgery together in a deadly cocktail
I've Been Chipped
News  |  3/28/2007  | 
The technology behind my new RFID-equipped US passport has been thought out remarkably well
Hacking the Car Navigation System
News  |  3/28/2007  | 
Italian researchers reveal attack methods on RDS-TMC navigation systems
New RFID Attack Opens the Door
News  |  3/23/2007  | 
Proof-of-concept lets intruder gain entry into the building by faking RFID readers with SQL injection
Oracle Sues SAP for Espionage
News  |  3/22/2007  | 
Database giant alleges SAP grabbed thousands of documents using IDs of defecting Oracle customers
Tools Fight Forensics
News  |  3/19/2007  | 
Anti-forensics tools are giving attackers more cover, InfoSec World speaker says
Risk Factors
News  |  3/19/2007  | 
Microsoft badly misfires with its plan to treat the same risks differently in Windows XP, Vista
Secure Stage
News  |  3/16/2007  | 
IT has to get certain details right if they expect users to take security seriously
Oracle Preps Security Features for 11g
News  |  3/16/2007  | 
Enhancements to database will focus on encryption, compliance
Seven Steps to Safer WiFi
News  |  3/14/2007  | 
Using public WiFi can be like the wireless Wild West. Here's how to tame (and secure) your experience
Smart USBs Gone Bad
News  |  3/13/2007  | 
Tapping the AutoRun feature of many PCs means they can be hacked using smart USB drives
HID Lists RFID Security Steps
News  |  3/13/2007  | 
In open letter to its customers, RFID vendor HID Global stands by its products, offers protective measures
Burger, Fries & Security
News  |  3/12/2007  | 
Wendy's franchisee outsources Internet access, security of its seven stores to BHI
If Data Were Like Cash
News  |  3/12/2007  | 
Then it wouldn't be acceptable to leave it in an employee's car, or worse, lose it
Small Businesses: Overconfident on Security
News  |  3/9/2007  | 
Most mom-and-pops think they've got customers' backs, but study suggests they may be big fat targets
A Good, Unified Theory
News  |  3/9/2007  | 
Don't wait for identity management's grand schemes to get aligned before diving into the maw
Banks, Retailers Seek to Regain User Trust
News  |  3/8/2007  | 
But new research suggests the trust battle is mostly uphill
Novell, Honeywell Get Physical
News  |  3/7/2007  | 
Vendors plan to unveil logical-physical security solutions this month
Leak Hunters
News  |  3/6/2007  | 
Cyber researchers prowl the Web for evidence of misdoings by employees, hackers, or competitors
Q&A: What to Do About Web 2(.0)
News  |  3/6/2007  | 
In an exclusive interview, Imperva co-founder talks Web 2.0 security risks, protection strategies, and how end-user education is a waste of time
Identifying With DHS
News  |  3/5/2007  | 
Department of Homeland Security struck a balance between caution and flexibility in its personal ID plan
Deep Threat
News  |  3/5/2007  | 
Insiders pose increasing danger to safety of corporate data, according to two new studies published today
Security's Three Deadly Sins
News  |  3/2/2007  | 
It all boils down to sloth, hubris, and greed
Vint Cerf: Father Knows Best
News  |  3/2/2007  | 
Internet founder talks actors, Googlers, and hackers


'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
456