News & Commentary

Content tagged with Compliance posted in June 2007
CSRF Bug Runs Rampant
News  |  6/26/2007  | 
Vulnerabilty found in Check Point, various firewalls, UTM appliances, routers, storage systems, and other devices managed with Web interfaces
Killing That 'Man in the Browser'
News  |  6/26/2007  | 
TriCipher to unveil transaction security tool today
Hacking Truckers
News  |  6/25/2007  | 
Researchers discover that the contents of a truck's haul are wide open to hackers via RFID
'You're Now Free to Move About the Company'
News  |  6/21/2007  | 
American Airlines pilots discover major vulnerability in company's intranet
People, Not Passwords, Are the Problem
News  |  6/20/2007  | 
UK government study says end users still don't know how to protect their passwords online
PatchLink Buys SecureWave
News  |  6/19/2007  | 
Deal merges endpoint security with patch management, vulnerability assessment
Stonesoft Seeks to Open Up VPNs
News  |  6/18/2007  | 
New SSL VPN products don't discriminate against mobile devices, non-employees
Server Room Follies
News  |  6/18/2007  | 
In which pizza and soda are shown to be more powerful than a crowbar for breaking and entering
A New Approach to Database Security
News  |  6/15/2007  | 
Startup Sentrigo prepares to launch Hedgehog, a new tool that works at the cache memory level
Eight Vulnerabilities You May Have Missed
News  |  6/15/2007  | 
With all the security vulnerabilities in the news, here's a look at some dangers that few are talking about
Survey: 1 in 4 WLANs Unsecured
News  |  6/13/2007  | 
RSA survey finds more WLANs, but not much security
Authentication Goes USB Route
News  |  6/13/2007  | 
TriCipher to debut smart drive-based, multi-factor authentication for $2 to $3 per user
Pfizer Falls Victim to P2P Hack
News  |  6/12/2007  | 
Attackers access personal information on 17,000 employees via laptop vulnerability
Architect's Many Identities
News  |  6/11/2007  | 
Dale Olds, creator of Novell's eDirectory, talks open-source ID, tuba photography, and how not to configure your home firewall
Attackers Break Into UVA Database
News  |  6/11/2007  | 
Personal data on nearly 6,000 former and current faculty members at the University of Virginia was compromised
P2P's Unintended Leaks
News  |  6/8/2007  | 
Or, how file-hungry music and video fans might download business-sensitive data
Security's Soft Underbelly
News  |  6/5/2007  | 
Many companies secure the walls, but databases remain the soft, chewy center
EMC Secures Verid
News  |  6/4/2007  | 
Vendor continues its security spending tear, picking up authentication specialist Verid


New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17177
PUBLISHED: 2018-09-18
An issue was discovered on Neato Botvac Connected 2.2.0 and Botvac 85 1.2.1 devices. Static encryption is used for the copying of so-called "black box" logs (event logs and core dumps) to a USB stick. These logs are RC4-encrypted with a 9-character password of *^JEd4W!I that is obfuscated ...
CVE-2018-17178
PUBLISHED: 2018-09-18
An issue was discovered on Neato Botvac Connected 2.2.0 devices. They execute unauthenticated manual drive commands (sent to /bin/webserver on port 8081) if they already have an active session. Commands like forward, back, arc-left, arc-right, pivot-left, and pivot-right are executed even though the...
CVE-2018-11869
PUBLISHED: 2018-09-18
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of length validation check for value received from firmware can lead to buffer overflow in WMA handler.
CVE-2018-17176
PUBLISHED: 2018-09-18
A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. Manual control mode requires authentication, but once recorded, the authentication (always transmitted in cleartext) can be replayed to /bin/webserver on port 8081. There are no nonces, and timestamps are not checked at all.
CVE-2018-11852
PUBLISHED: 2018-09-18
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper check In the WMA API for the inputs received from the firmware and then fills the same to the host structure will lead to OOB write.