News & Commentary

Content tagged with Compliance posted in May 2010
Researchers Uncover Bot Sales Network
Quick Hits  |  5/28/2010  | 
Internet portal offers bots designed for a variety of activities at a wide range of prices, PandaLabs says
Product Watch: New Patents Help Upstart Make A Ruckus In Wireless Security Management
News  |  5/25/2010  | 
New technologies promise to simplify the configuration and administration of Wi-Fi security
IE 6 Accounts For More Than One-Fourth Of All Enterprise Web Traffic
Quick Hits  |  5/25/2010  | 
But use of the aged and vulnerable version of Internet Explorer gradually declining, report says
Apple Safari 'Carpet Bomb' Flaw Remains Unfixed Two Years Later
News  |  5/24/2010  | 
Google Chrome also prone to similar attacks
New Threat For Wireless Networks: Typhoid Adware
Quick Hits  |  5/21/2010  | 
Some users could become "carriers," unknowingly passing infections to others, university researchers say
ID Theft Victims Spending Less In Cleanup Aftermath
News  |  5/21/2010  | 
New Identity Theft Resource Center (ITRC) report shows victims spending less time, money to clear their names
Symantec To Buy VeriSign's Authentication Business For $1.28 Billion
News  |  5/19/2010  | 
VeriSign will refocus business on Internet infrastructure, naming services
Facebook Readies Simpler Privacy Options
News  |  5/19/2010  | 
Possibilities include changing default settings on the site
Product Watch: AT&T Launches New Cloud-Based Email Security Offering
News  |  5/17/2010  | 
New AT&T Secure E-mail Gateway Service uses McAfee's global threat intelligence technology
Product Watch: Facebook Adds New Anti-Hacking Protections
News  |  5/14/2010  | 
Security feature blocks suspicious logins
Report: U.S. Internet Registrars Continue To Host Phony Online Pharmacy
Quick Hits  |  5/4/2010  | 
How a major fake online pharmacy out of Russia is able to continue selling drugs despite evidence of criminal operations


Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20168
PUBLISHED: 2018-12-17
Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service ("physical address not valid" panic) via a crafted application.
CVE-2018-20167
PUBLISHED: 2018-12-17
Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME typ...
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.