EMV: The Anniversary Of One Deadline, The Eve of Another
10 Hottest Sessions At Black Hat Europe 2016
Clinton, Trump Debate 'Twenty-First Century War' Of Cyberattacks
25 Security Vendors To Watch
7 New Rules For IoT Safety & Vuln Disclosure
News & Commentary
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Rick Holland of Digital Shadows explains how the attackers' superior business agility, faster change management, specialized job force, lower barriers to entry and bulletproof hosting keeps them ahead of the good guys.
By Sara Peters Senior Editor at Dark Reading, 9/30/2016
Comment0 comments  |  Read  |  Post a Comment
6 Ways To Prepare For The EUs GDPR
Jai Vijayan, Freelance writerNews
In less than 20 months, all US companies doing business in the EU will face new consumer privacy requirements. Heres how to prepare for them.
By Jai Vijayan Freelance writer, 9/30/2016
Comment0 comments  |  Read  |  Post a Comment
Today's Cybersecurity Management Requires A New Approach
Samuel Visner & Beth Musumeci,  Senior VP, General Manager & Senior VP, ICF Commercial Cybersecurity Practice Commentary
The current managed security services provider model just doesn't work in our information-rich world. Time to shake things up.
By Samuel Visner & Beth Musumeci Senior VP, General Manager & Senior VP, ICF Commercial Cybersecurity Practice , 9/30/2016
Comment1 Comment  |  Read  |  Post a Comment
Cybercrime-as-a-Service Offered To Militants, Terrorists, Says Europol
Dark Reading Staff, Quick Hits
The Darknet could provide ample resources and services for terrorists to carry out attacks, claims report.
By Dark Reading Staff , 9/30/2016
Comment1 Comment  |  Read  |  Post a Comment
Romanian National Gets Three Years For Hack Scheme
Dark Reading Staff, Quick Hits
Mircea-Ilie Ispasoiu was arrested for international hacking plot that involved wire fraud and aggravated identity theft.
By Dark Reading Staff , 9/30/2016
Comment1 Comment  |  Read  |  Post a Comment
10 Hottest Sessions At Black Hat Europe 2016
Sean Martin, CISSP | President, imsmartin
A sneak-peek at some of the more intriguing Briefings at the upcoming conference in London.
By Sean Martin CISSP | President, imsmartin, 9/30/2016
Comment2 comments  |  Read  |  Post a Comment
EMV: The Anniversary Of One Deadline, The Eve of Another
Sara Peters, Senior Editor at Dark ReadingNews
How merchants and criminals responded since the EMV liability shift for point-of-sale devices one year ago. And what changes can we expect after the liability shift for ATMs, which is just days away?
By Sara Peters Senior Editor at Dark Reading, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
How A Pair Of Cybercriminals Scales Its Carder Business
Jai Vijayan, Freelance writerNews
'Vendetta Brothers' cybercrime duo runs site that offers cards stolen from over 600 banks in 41 countries, FireEye says.
By Jai Vijayan Freelance writer, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Researchers Shoot Down Yahoo Claim Of Nation-State Hack
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
InfoArmor says the attackers who stole a half-billion Yahoo user accounts were seasoned cybercriminals who later sold the booty to an Eastern European nation-state.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
Kelly Sheridan, Associate Editor, InformationWeekNews
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.
By Kelly Sheridan Associate Editor, InformationWeek, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Fear & Loathing In The Cloud
Tim Prendergast, Founder & CEO, Evident.ioCommentary
Whether you've already bought your ticket for the cloud or still have some issues to sort through, fine-tune your security practices to make sure your ride is a smooth one.
By Tim Prendergast Founder & CEO, Evident.io, 9/29/2016
Comment2 comments  |  Read  |  Post a Comment
A Bug Bounty Reality-Check
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New study shows that bug bounties without a secure application development program and testing can be costly.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Microsoft Launches Cloud-Based Fuzzing
Steve Zurier, Freelance WriterNews
'Project Springfield' debuts at Ignite conference.
By Steve Zurier Freelance Writer, 9/28/2016
Comment1 Comment  |  Read  |  Post a Comment
Russian Hackers Target Citizen Journalists Reporting On Malaysian Airlines Crash
Jai Vijayan, Freelance writerNews
Bellingcats reporters have been hit with spear phishing attacks and account takeover attempts for over a year, ThreatConnect says.
By Jai Vijayan Freelance writer, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
The Real Reasons Why Users Stink At Passwords
Terry Sweeney, Contributing EditorNews
Personality, denial, and authentication-overload are big factors, new study finds.
By Terry Sweeney Contributing Editor, 9/28/2016
Comment14 comments  |  Read  |  Post a Comment
Hacking The Polls: Where US Voting Processes Fall Short
Jeff Schilling, Chief of Operations and Security, ArmorCommentary
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.
By Jeff Schilling Chief of Operations and Security, Armor, 9/28/2016
Comment5 comments  |  Read  |  Post a Comment
More Than Half Of IT Pros Employ Insecure Data Wiping Methods
Emily Johnson, Associate Editor, UBM AmericasNews
Recent study shows most enterprise IT professionals incorrectly believe emptying a Recycle Bin or reformatting a computer drive permanently erases data.
By Emily Johnson Associate Editor, UBM Americas, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Improving Security Savvy Of Execs And Board Room
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jeff Welgan describes how best to improve cybersecurity literacy throughout the C-suite.
By Sara Peters Senior Editor at Dark Reading, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
SWIFT Toughens Customer Security With New Mandatory Rules
Dark Reading Staff, Quick Hits
Measures to include set of core safety standards and assurance framework requiring annual self-attestation by SWIFT members.
By Dark Reading Staff , 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Beep Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
Tom Quillin, Director of Cyber Security Technology & Initiatives, Intel Corporation
The practice of security economics demonstrates how gaps in the security architecture impair business results.
By Tom Quillin Director of Cyber Security Technology & Initiatives, Intel Corporation, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
The Real Reasons Why Users Stink At Passwords
Terry Sweeney, Contributing Editor,  9/28/2016
Ransomware: Coming To A Hospital Near You?
Christiaan Beek, Threat Intelligence Research, Office of the CTO,Intel Security,  9/26/2016
Hacking The Polls: Where US Voting Processes Fall Short
Jeff Schilling, Chief of Operations and Security, Armor,  9/28/2016
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Cartoon Contest
Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Flash Poll
Video
Slideshows
Twitter Feed