News & Commentary

Content tagged with Compliance posted in July 2007
Virtualization's New Benchmark
News  |  7/27/2007  | 
Consortium gives recommendations for securing emerging virtualized technology
Aflac Loses Data on 152,000
News  |  7/27/2007  | 
Company quacks 'fowl!' over theft of laptop in Japan
Third Parties Fumble Data Handoffs
News  |  7/26/2007  | 
Your company's data breach may result from a partner's mistakes
Startup Locks Down Mobile Linux
News  |  7/26/2007  | 
New version of mobile OS verifies apps, firmware, and encrypts data
Hacking Without Exploits
News  |  7/25/2007  | 
Researcher HD Moore to show at Black Hat and Defcon ways to hack a fully patched system
New Tool Automates Spam
News  |  7/25/2007  | 
Cheap software promises to post 1,100 messages to Web forums in less than 15 minutes
Banks Lag in Strong Authentication
News  |  7/24/2007  | 
New study says majority of banks won't have multi-factor authentication until next year
Picture Your Password
News  |  7/23/2007  | 
Researchers are taking a look at graphical passwords, but the picture is still fuzzy on their effectiveness
Pointing to Danger
News  |  7/23/2007  | 
Researcher to show how dangling pointer flaws, long viewed as inconsequential, can be a path to serious infection
ID Management Gets Granular
News  |  7/20/2007  | 
New TNT software helps companies control access to critical data by user, device, and time of day
Cigna Goes on a Role
News  |  7/20/2007  | 
Health benefits provider automates upkeep of its role-based user access control
Thinning the Herd
News  |  7/17/2007  | 
No matter how you slice it, it's time to cut the password plethora
Old Flaw Threatens Web 2.0
News  |  7/12/2007  | 
DNS pinning flaw gives attackers inroads to the corporate intranet - via the browser
DLP in Flux
News  |  7/3/2007  | 
Enterprises should think before they leap into data leakage prevention technology, new report says
Mobile Phones Generate Passwords
News  |  7/2/2007  | 
New app puts two-factor authentication on handset


Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Containerized Apps: An 8-Point Security Checklist
Jai Vijayan, Freelance writer,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-5236
PUBLISHED: 2018-06-20
Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 may be susceptible to a race condition (or race hazard). This type of issue occurs in software where the output is dependent on the sequence or timing of other uncontrollable events.
CVE-2018-5237
PUBLISHED: 2018-06-20
Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 could be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
CVE-2018-6211
PUBLISHED: 2018-06-20
On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, OS command injection is possible as a result of incorrect processing of the res_buf parameter to index.cgi.
CVE-2018-6212
PUBLISHED: 2018-06-20
On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, a reflected Cross-Site Scripting (XSS) attack is possible as a result of missed filtration for special characters in the "Search" field and incorrect proc...
CVE-2018-6213
PUBLISHED: 2018-06-20
In the web server on D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, there is a hardcoded password of anonymous for the admin account.