News & Commentary

Content tagged with Compliance posted in May 2010
Researchers Uncover Bot Sales Network
Quick Hits  |  5/28/2010  | 
Internet portal offers bots designed for a variety of activities at a wide range of prices, PandaLabs says
Product Watch: New Patents Help Upstart Make A Ruckus In Wireless Security Management
News  |  5/25/2010  | 
New technologies promise to simplify the configuration and administration of Wi-Fi security
IE 6 Accounts For More Than One-Fourth Of All Enterprise Web Traffic
Quick Hits  |  5/25/2010  | 
But use of the aged and vulnerable version of Internet Explorer gradually declining, report says
Apple Safari 'Carpet Bomb' Flaw Remains Unfixed Two Years Later
News  |  5/24/2010  | 
Google Chrome also prone to similar attacks
New Threat For Wireless Networks: Typhoid Adware
Quick Hits  |  5/21/2010  | 
Some users could become "carriers," unknowingly passing infections to others, university researchers say
ID Theft Victims Spending Less In Cleanup Aftermath
News  |  5/21/2010  | 
New Identity Theft Resource Center (ITRC) report shows victims spending less time, money to clear their names
Symantec To Buy VeriSign's Authentication Business For $1.28 Billion
News  |  5/19/2010  | 
VeriSign will refocus business on Internet infrastructure, naming services
Facebook Readies Simpler Privacy Options
News  |  5/19/2010  | 
Possibilities include changing default settings on the site
Product Watch: AT&T Launches New Cloud-Based Email Security Offering
News  |  5/17/2010  | 
New AT&T Secure E-mail Gateway Service uses McAfee's global threat intelligence technology
Product Watch: Facebook Adds New Anti-Hacking Protections
News  |  5/14/2010  | 
Security feature blocks suspicious logins
Report: U.S. Internet Registrars Continue To Host Phony Online Pharmacy
Quick Hits  |  5/4/2010  | 
How a major fake online pharmacy out of Russia is able to continue selling drugs despite evidence of criminal operations


'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12716
PUBLISHED: 2018-06-25
The API service on Google Home and Chromecast devices before mid-July 2018 does not prevent DNS rebinding attacks from reading the scan_results JSON data, which allows remote attackers to determine the physical location of most web browsers by leveraging the presence of one of these devices on its l...
CVE-2018-12705
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have XSS via the SSID (it is validated only on the client side).
CVE-2018-12706
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have a Buffer Overflow via a long Authorization HTTP header.
CVE-2018-12714
PUBLISHED: 2018-06-24
An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial o...
CVE-2018-12713
PUBLISHED: 2018-06-24
GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was ...