News & Commentary

Content tagged with Compliance posted in September 2010
You're Always Just Two Clicks Away From Malware
Quick Hits  |  9/28/2010  | 
New study shows correlation between top 1,000 visited websites and proximity to malware
Turn Workers Into Security Partners
News  |  9/20/2010  | 
Rather than just protect employees or protect against them, security managers should rely on users to help defend the business
Google Bolsters Apps With Two-Step Verification
News  |  9/20/2010  | 
Protection will be available first to Google Apps Premiere, Government, and Education edition users, at no extra charge
Product Watch: New Tool Moves Browser Into Virtual Environment For Security
News  |  9/13/2010  | 
Shields Windows machine from Web-borne attacks
ESET Rolls Out Cybersecurity For Mac
News  |  9/13/2010  | 
Security solution features an interactive educational component for users
Deloitte Poll: Respondents Lack Confidence in Ability of Private Enterprises To Reduce Occurrence Of Cyber Crime
News  |  9/10/2010  | 
Majority of participants said they have received phishing e-mail messages
String Of Deals Shows Demand for Cloud-Based Authentication
News  |  9/7/2010  | 
Acquisitions highlight how authentication-as-a-service is now part of identity and access management strategies


Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20168
PUBLISHED: 2018-12-17
Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service ("physical address not valid" panic) via a crafted application.
CVE-2018-20167
PUBLISHED: 2018-12-17
Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME typ...
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.