News & Commentary

Content tagged with Compliance posted in March 2007
Cisco's NAC Gets Hacked
News  |  3/30/2007  | 
German security experts develop tool that spoofs legitimate client and fools Cisco servers into allowing network access
Eight Faces of a Hacker
News  |  3/29/2007  | 
Profilers decipher who they are, why they do it as new subcategories start to emerge
Killer Combo: XSS + CSRF
News  |  3/29/2007  | 
Researchers mix cross-site scripting and cross-site request forgery together in a deadly cocktail
I've Been Chipped
News  |  3/28/2007  | 
The technology behind my new RFID-equipped US passport has been thought out remarkably well
Hacking the Car Navigation System
News  |  3/28/2007  | 
Italian researchers reveal attack methods on RDS-TMC navigation systems
New RFID Attack Opens the Door
News  |  3/23/2007  | 
Proof-of-concept lets intruder gain entry into the building by faking RFID readers with SQL injection
Oracle Sues SAP for Espionage
News  |  3/22/2007  | 
Database giant alleges SAP grabbed thousands of documents using IDs of defecting Oracle customers
Tools Fight Forensics
News  |  3/19/2007  | 
Anti-forensics tools are giving attackers more cover, InfoSec World speaker says
Risk Factors
News  |  3/19/2007  | 
Microsoft badly misfires with its plan to treat the same risks differently in Windows XP, Vista
Secure Stage
News  |  3/16/2007  | 
IT has to get certain details right if they expect users to take security seriously
Oracle Preps Security Features for 11g
News  |  3/16/2007  | 
Enhancements to database will focus on encryption, compliance
Seven Steps to Safer WiFi
News  |  3/14/2007  | 
Using public WiFi can be like the wireless Wild West. Here's how to tame (and secure) your experience
Smart USBs Gone Bad
News  |  3/13/2007  | 
Tapping the AutoRun feature of many PCs means they can be hacked using smart USB drives
HID Lists RFID Security Steps
News  |  3/13/2007  | 
In open letter to its customers, RFID vendor HID Global stands by its products, offers protective measures
Burger, Fries & Security
News  |  3/12/2007  | 
Wendy's franchisee outsources Internet access, security of its seven stores to BHI
If Data Were Like Cash
News  |  3/12/2007  | 
Then it wouldn't be acceptable to leave it in an employee's car, or worse, lose it
Small Businesses: Overconfident on Security
News  |  3/9/2007  | 
Most mom-and-pops think they've got customers' backs, but study suggests they may be big fat targets
A Good, Unified Theory
News  |  3/9/2007  | 
Don't wait for identity management's grand schemes to get aligned before diving into the maw
Banks, Retailers Seek to Regain User Trust
News  |  3/8/2007  | 
But new research suggests the trust battle is mostly uphill
Novell, Honeywell Get Physical
News  |  3/7/2007  | 
Vendors plan to unveil logical-physical security solutions this month
Leak Hunters
News  |  3/6/2007  | 
Cyber researchers prowl the Web for evidence of misdoings by employees, hackers, or competitors
Q&A: What to Do About Web 2(.0)
News  |  3/6/2007  | 
In an exclusive interview, Imperva co-founder talks Web 2.0 security risks, protection strategies, and how end-user education is a waste of time
Identifying With DHS
News  |  3/5/2007  | 
Department of Homeland Security struck a balance between caution and flexibility in its personal ID plan
Deep Threat
News  |  3/5/2007  | 
Insiders pose increasing danger to safety of corporate data, according to two new studies published today
Security's Three Deadly Sins
News  |  3/2/2007  | 
It all boils down to sloth, hubris, and greed
Vint Cerf: Father Knows Best
News  |  3/2/2007  | 
Internet founder talks actors, Googlers, and hackers

Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
(ISC)2 Report: Glaring Disparity in Diversity for US Cybersecurity
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/15/2018
Voice-Operated Devices, Enterprise Security & the 'Big Truck' Attack
Menny Barzilay, Co-founder & CEO, FortyTwo Global,  3/15/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.