News & Commentary

Content tagged with Compliance posted in May 2007
VeriSign's CEO Signs Off
News  |  5/29/2007  | 
Analysts say company could get fresh start as Sclavos walks after 12-year tenure
Microsoft Takes Aim at Endpoint
News  |  5/25/2007  | 
Microsoft says Network Access Protection (NAP), SSL VPN gateway will play nicely together
Wireless: Fix, Not Flaw
News  |  5/25/2007  | 
New applications help WiFi shed its image as enterprises' biggest network vulnerability
NAC Vendors in the Hot Seat
News  |  5/24/2007  | 
Cisco, Microsoft shared the dais, and their thoughts on NAC, here yesterday at Interop
New Spec Could Cut Phishing, Spam
News  |  5/23/2007  | 
IETF approves email signature standard pioneered by Yahoo!, Cisco
Seven Habits of Highly Malicious Hackers
News  |  5/18/2007  | 
Interop session details the anatomy of a hacker attack, step-by-step
Microsoft Meets Xbox Hacker
News  |  5/16/2007  | 
At Blue Hat Security Briefings, hackers school Microsoft on threats
IBM, Symantec Tackle Compliance
News  |  5/15/2007  | 
New tools and strategies promise to cut costs, speed projects; now they have to deliver
Bumpy Road Ahead
News  |  5/15/2007  | 
We can't always anticipate security issues... But we can try
Verizon Grabs Cybertrust
News  |  5/14/2007  | 
Merger sets stage for clash of telecom titans
SSL VPN From Your Smartphone
News  |  5/14/2007  | 
Secure VPN access to corporate apps from Windows smartphones
California Hammers on E-Voting
News  |  5/10/2007  | 
Comprehensive audit and penetration test designed to end voters' fears about electronic voting
RFID Security Service, Tools on Tap
News  |  5/10/2007  | 
New audit service and appliance to target RFID customers looking to lock down their systems
Mizzou's Help Desk Hack
News  |  5/9/2007  | 
Attacker accesses more than 22,000 student records by cracking university's computer trouble-reporting system
Symantec Readies New Client Tools
News  |  5/7/2007  | 
CTO, research VP offer glimpse at company's product drawing board
Trust & Deception
News  |  5/7/2007  | 
They're both actively at work in infosec, and new attacks take equal advantage of them
SEC: WFI Insider Stole $7.7M
News  |  5/3/2007  | 
Stock options manager accused of abusing access rights to embezzle 700,000 shares from wireless security firm
DR's 10 Most Popular Stories Ever
News  |  5/2/2007  | 
Our first year featured thumb-drive lures, lax end users, dumb smart cards, myths, and a Microsoft misstep


WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17229
PUBLISHED: 2018-09-19
Exiv2::d2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
CVE-2018-17230
PUBLISHED: 2018-09-19
Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
CVE-2018-17231
PUBLISHED: 2018-09-19
** DISPUTED ** Telegram Desktop (aka tdesktop) 1.3.14 might allow attackers to cause a denial of service (assertion failure and application exit) via an "Edit color palette" search that triggers an "index out of range" condition. NOTE: this issue is disputed by multiple third par...
CVE-2018-17228
PUBLISHED: 2018-09-19
nmap4j 1.1.0 allows attackers to execute arbitrary commands via shell metacharacters in an includeHosts call.
CVE-2018-8889
PUBLISHED: 2018-09-19
A directory traversal vulnerability in the Connect Service of the BlackBerry Enterprise Mobility Server (BEMS) 2.8.17.29 and earlier could allow an attacker to retrieve arbitrary files in the context of a BEMS administrator account.