News & Commentary

Content tagged with Compliance posted in May 2012
Security Expert Fools, Records Fake Antivirus Scammers
News  |  5/24/2012  | 
Phony AV scammers posing as Microsoft dialed the wrong number when they inadvertently phoned a security researcher at home -- who exposed their obvious lack of technical know-how
Don't Be The Nerdiest Person In The Room
Commentary  |  5/24/2012  | 
Technical language has its place, but overuse hampers compliance
Malware 'Licensing' Could Stymie Automated Analysis
News  |  5/22/2012  | 
The use of encryption and digital-rights management techniques by the authors of malicious code could make automated analysis of malware take longer and require human intervention more often
Revamp Mobile Policy To Secure The Cloud
News  |  5/21/2012  | 
A majority of employees bring their own devices into work and connect out to the cloud -- now it's time to gain greater control over the security of these devices
How To Keep Your Users -- And Your Data -- Safe On The Web
News  |  5/18/2012  | 
Careless -- and occasionally malicious -- Web-browsing users might be the most serious threat to your organization's data. Here are some tips for keeping it safe.
Manage Risk As A Strategy, Comply With Regulations As A Tactic
Commentary  |  5/17/2012  | 
Compliance alone should never be the only goal
Well Over Half The World's Computer Users Admit Pirating Software, BSA Study Finds
News  |  5/15/2012  | 
Emerging markets drove the commercial value of software theft to a new record $63.4 billion in 2011
Number Of Software Pirates On The Rise
News  |  5/15/2012  | 
Fifty-seven percent of respondents said they've pirated software, according to Business Software Alliance study
How To Better Measure Botnet Size
News  |  5/8/2012  | 
Efforts under way to get more accurate accounting of bot-infected machines
Screw Compliance, We're Trying to Survive
Commentary  |  5/8/2012  | 
In tough times, compliance efforts may seem optional
10 Symptoms Of Check-Box Compliance
News  |  5/7/2012  | 
These telltale signs show you care more about what the auditors think than what the attackers do
What Works For One Does Not Work For Two
Commentary  |  5/1/2012  | 
To remain compliant, your approach must grow in scale with your business


'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-8651
PUBLISHED: 2018-12-12
A cross site scripting vulnerability exists when Microsoft Dynamics NAV does not properly sanitize a specially crafted web request to an affected Dynamics NAV server, aka "Microsoft Dynamics NAV Cross Site Scripting Vulnerability." This affects Microsoft Dynamics NAV.
CVE-2018-8652
PUBLISHED: 2018-12-12
A Cross-site Scripting (XSS) vulnerability exists when Windows Azure Pack does not properly sanitize user-provided input, aka "Windows Azure Pack Cross Site Scripting Vulnerability." This affects Windows Azure Pack Rollup 13.1.
CVE-2018-8617
PUBLISHED: 2018-12-12
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8...
CVE-2018-8618
PUBLISHED: 2018-12-12
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8...
CVE-2018-8619
PUBLISHED: 2018-12-12
A remote code execution vulnerability exists when the Internet Explorer VBScript execution policy does not properly restrict VBScript under specific conditions, aka "Internet Explorer Remote Code Execution Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Exp...