News & Commentary

Content tagged with Compliance posted in May 2007
VeriSign's CEO Signs Off
News  |  5/29/2007  | 
Analysts say company could get fresh start as Sclavos walks after 12-year tenure
Microsoft Takes Aim at Endpoint
News  |  5/25/2007  | 
Microsoft says Network Access Protection (NAP), SSL VPN gateway will play nicely together
Wireless: Fix, Not Flaw
News  |  5/25/2007  | 
New applications help WiFi shed its image as enterprises' biggest network vulnerability
NAC Vendors in the Hot Seat
News  |  5/24/2007  | 
Cisco, Microsoft shared the dais, and their thoughts on NAC, here yesterday at Interop
New Spec Could Cut Phishing, Spam
News  |  5/23/2007  | 
IETF approves email signature standard pioneered by Yahoo!, Cisco
Seven Habits of Highly Malicious Hackers
News  |  5/18/2007  | 
Interop session details the anatomy of a hacker attack, step-by-step
Microsoft Meets Xbox Hacker
News  |  5/16/2007  | 
At Blue Hat Security Briefings, hackers school Microsoft on threats
IBM, Symantec Tackle Compliance
News  |  5/15/2007  | 
New tools and strategies promise to cut costs, speed projects; now they have to deliver
Bumpy Road Ahead
News  |  5/15/2007  | 
We can't always anticipate security issues... But we can try
Verizon Grabs Cybertrust
News  |  5/14/2007  | 
Merger sets stage for clash of telecom titans
SSL VPN From Your Smartphone
News  |  5/14/2007  | 
Secure VPN access to corporate apps from Windows smartphones
California Hammers on E-Voting
News  |  5/10/2007  | 
Comprehensive audit and penetration test designed to end voters' fears about electronic voting
RFID Security Service, Tools on Tap
News  |  5/10/2007  | 
New audit service and appliance to target RFID customers looking to lock down their systems
Mizzou's Help Desk Hack
News  |  5/9/2007  | 
Attacker accesses more than 22,000 student records by cracking university's computer trouble-reporting system
Symantec Readies New Client Tools
News  |  5/7/2007  | 
CTO, research VP offer glimpse at company's product drawing board
Trust & Deception
News  |  5/7/2007  | 
They're both actively at work in infosec, and new attacks take equal advantage of them
SEC: WFI Insider Stole $7.7M
News  |  5/3/2007  | 
Stock options manager accused of abusing access rights to embezzle 700,000 shares from wireless security firm
DR's 10 Most Popular Stories Ever
News  |  5/2/2007  | 
Our first year featured thumb-drive lures, lax end users, dumb smart cards, myths, and a Microsoft misstep


Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
How to Engage Your Cyber Enemies
Guy Nizan, CEO at Intsights Cyber Intelligence,  12/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20228
PUBLISHED: 2018-12-19
Subsonic V6.1.5 allows internetRadioSettings.view streamUrl CSRF, with resultant SSRF.
CVE-2018-20230
PUBLISHED: 2018-12-19
An issue was discovered in PSPP 1.2.0. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
CVE-2018-20231
PUBLISHED: 2018-12-19
Cross Site Request Forgery (CSRF) in the two-factor-authentication plugin before 1.3.13 for WordPress allows remote attackers to disable 2FA via the tfa_enable_tfa parameter due to missing nonce validation.
CVE-2018-20227
PUBLISHED: 2018-12-19
RDF4J 2.4.2 allows Directory Traversal via ../ in an entry in a ZIP archive.
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...