News & Commentary

Content tagged with Compliance posted in April 2007
Telcos at Risk of Web Bugs
News  |  4/27/2007  | 
Service providers face security learning curve as they roll out next-generation Web services
Retailers Still Lag in PCI Compliance
News  |  4/17/2007  | 
Despite recent data breaches, more than half still have not implemented guidelines for protecting credit card data
SCADA State of Denial
News  |  4/16/2007  | 
More bugs and security tools for process control industry - but it's more a mindset than a technology problem
Loan Companies Abusing Student Database
News  |  4/16/2007  | 
Financial companies accused of unauthorized mining of National Student Loan Data System
Electoral Subtext
News  |  4/16/2007  | 
Whether you're monitoring the voting process or the status of your most valued server, you better have a Plan B
Study: Browser Warnings Don't Work
News  |  4/13/2007  | 
Despite lock-and-key icons and pop-up alerts, banking users just keep on loggin' on, Harvard/MIT researchers say
10 Hot Security Startups
News  |  4/12/2007  | 
Want to know who's on the cutting edge of security technology? Take a look at these 10 newcomers
Feds Under Fire Over Security
News  |  4/12/2007  | 
Agencies get C- on security report card; FTC criticized for low number of spam, spyware convictions
Security Enforcement, The Cooperative Way
News  |  4/11/2007  | 
Aventail pushes envelope on cooperative policy enforcement, will add interfaces to SSL VPN gateways this year
RFID Under Attack Again
News  |  4/9/2007  | 
RFID hacking isn't rocket science, but the risk depends on proper use, deployment
Whirlpool Spins New Address Scheme
News  |  4/6/2007  | 
New DNS address management tools help appliance maker wash away previous security woes
Hacking Bluetooth With a USB Stick
News  |  4/5/2007  | 
European researchers have built a Bluetooth sniffer on a $30 USB dongle
Audit Uncovers IRS Security Flaws
News  |  4/4/2007  | 
Tax agency not doing enough to protect taxpayer data on laptops, PCs, according to Treasury report
Dude, Where's Your PC?
News  |  4/2/2007  | 
Audit exposes lost computers at counterintelligence agency, need for better inventory management


Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Containerized Apps: An 8-Point Security Checklist
Jai Vijayan, Freelance writer,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-5236
PUBLISHED: 2018-06-20
Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 may be susceptible to a race condition (or race hazard). This type of issue occurs in software where the output is dependent on the sequence or timing of other uncontrollable events.
CVE-2018-5237
PUBLISHED: 2018-06-20
Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 could be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
CVE-2018-6211
PUBLISHED: 2018-06-20
On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, OS command injection is possible as a result of incorrect processing of the res_buf parameter to index.cgi.
CVE-2018-6212
PUBLISHED: 2018-06-20
On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, a reflected Cross-Site Scripting (XSS) attack is possible as a result of missed filtration for special characters in the "Search" field and incorrect proc...
CVE-2018-6213
PUBLISHED: 2018-06-20
In the web server on D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, there is a hardcoded password of anonymous for the admin account.