Dark Reading News Desk Comes To You Live From Black Hat
Cyber Boot Camp: Lessons Learned
There's Another Android Media Vulnerability, But Google Isn't Worried
Breaking Honeypots For Fun And Profit
Car Hacking Shifts Into High Gear
News & Commentary
Dark Reading Launches Jobs Board
Tim Wilson, Editor in Chief, Dark ReadingCommentary
New feature will help hiring companies and security job seekers find each other online.
By Tim Wilson Editor in Chief, Dark Reading, 8/4/2015
Comment0 comments  |  Read  |  Post a Comment
Dark Reading Preps Week Of Show Coverage At Black Hat USA
Tim Wilson, Editor in Chief, Dark ReadingCommentary
If you want to know what's happening in Las Vegas this week at Black Hat, Dark Reading's got the scoop.
By Tim Wilson Editor in Chief, Dark Reading, 8/3/2015
Comment0 comments  |  Read  |  Post a Comment
Web Attacks Employing Upgraded Crimeware Kit Hit 1.5 Million Users
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
RIG 3.0 used to infect millions of Internet Explorer (IE) users worldwide -- mostly via malvertising.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/3/2015
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading News Desk Comes To You Live From Black Hat
Sara Peters, Senior Editor at Dark ReadingCommentary
Live video coverage from Las Vegas Wednesday and Thursday
By Sara Peters Senior Editor at Dark Reading, 8/3/2015
Comment3 comments  |  Read  |  Post a Comment
Breaking Honeypots For Fun And Profit
Gadi Evron,  CEO & founder, CymmetriaCommentary
As a concept, honeypots can be a powerful tool for detecting malware. But in the emerging field of cyber deception, they’re not up to the task of fooling attackers and getting our hands on their resources.
By By Gadi Evron, CEO & founder, Cymmetria , 8/3/2015
Comment2 comments  |  Read  |  Post a Comment
Cyber Boot Camp: Lessons Learned
Marilyn Cohodas, Community Editor, Dark Reading
What happens when 50 young people spend a week in the trenches with cybersecurity researchers from ESET? One picture is worth a thousand words. Here are seven.
By Marilyn Cohodas Community Editor, Dark Reading, 7/31/2015
Comment4 comments  |  Read  |  Post a Comment
GM Vehicles Can Be Located, Unlocked, Started Remotely Via OnStar App
Jai Vijayan, Freelance writerNews
White Hat hacker Samy Kamkar’s OwnStart device latest to show up vulnerabilities in modern vehicles
By Jai Vijayan Freelance writer, 7/31/2015
Comment1 Comment  |  Read  |  Post a Comment
Startup 'Stealth Worker' Matches Businesses With Security Talent
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New online service helps businesses looking for part-time security professionals fill specific job needs.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/30/2015
Comment2 comments  |  Read  |  Post a Comment
There's Another Android Media Vulnerability, But Google Isn't Worried
Sara Peters, Senior Editor at Dark ReadingNews
Vulnerability could become a favorite of ransomware operators, but Google has left it unpatched for more than two months.
By Sara Peters Senior Editor at Dark Reading, 7/30/2015
Comment2 comments  |  Read  |  Post a Comment
Study Reveals the Most Common Attack Methods of Data Thieves
Raja Patel, Vice President and General Manager of Network Security at Intel Security
Learning more about your attackers helps to improve your security profile and reduce the possibility of a breach.
By Raja Patel Vice President and General Manager of Network Security at Intel Security, 7/30/2015
Comment1 Comment  |  Read  |  Post a Comment
Closing The Gap Between Security & Networking Ops: 5 Best Practices
Nimmy Reichenberg, VP of Strategy, AlgoSecCommentary
If your factions are warring, there’s a lot you can do about it. Here’s how -- and why you can’t afford to wait.
By Nimmy Reichenberg VP of Strategy, AlgoSec, 7/30/2015
Comment1 Comment  |  Read  |  Post a Comment
From Russia With Love: A Slew of New Hacker Capabilities and Services
Jai Vijayan, Freelance writerNews
A review of the Russian underground by Trend Micro reveals it to be the world’s most sophisticated.
By Jai Vijayan Freelance writer, 7/30/2015
Comment0 comments  |  Read  |  Post a Comment
Anthem Breach Linked To Black Vine Group & Beijing InfoSec Firm
Sara Peters, Senior Editor at Dark ReadingNews
Health insurer's breach of 80 million records attributed to 'well-resourced cyberespionage group' Black Vine. Could they also be behind breaches at OPM and United Airlines?
By Sara Peters Senior Editor at Dark Reading, 7/29/2015
Comment0 comments  |  Read  |  Post a Comment
Can't Touch This: 'Hammertoss' Russian Cyberspies Hide In Plain Sight
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
APT29 cyber espionage attackers operate under the cover of legitimate services including Twitter, Github, and cloud storage services.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/29/2015
Comment3 comments  |  Read  |  Post a Comment
Code Theft: Protecting IP At The Source
Anna Chiang, Technical Marketing Manager, Perforce SoftwareCommentary
Your corporate assets are at risk and every day that you avoid taking action shortens the time until your IP will be leaked. Here are six steps toward better data security.
By Anna Chiang Technical Marketing Manager, Perforce Software, 7/29/2015
Comment2 comments  |  Read  |  Post a Comment
Researchers Steal Door Badge Credentials Using Smartphone Bluetooth
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Weakness in facility access control protocol leaves most badge-in systems open to attack.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/28/2015
Comment2 comments  |  Read  |  Post a Comment
Lockheed Martin-Led Consortium Builds Secure 'System Of Systems'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Multilevel Security (MLS) group says this policy-based architecture could apply to sensitive commercial networks as well as government agencies.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/28/2015
Comment11 comments  |  Read  |  Post a Comment
How To Put Data At The Heart Of Your Security Practice
Jay Jacobs, Senior Data Scientist, BitSight TechnologiesCommentary
First step: A good set of questions that seek out objective, measurable answers.
By Jay Jacobs Senior Data Scientist, BitSight Technologies, 7/28/2015
Comment1 Comment  |  Read  |  Post a Comment
What 30 Classic Games Can Teach Us about Security
David Spark, Veteran Tech journalist and founder of Spark Media Solutions
Information security experts share their thoughts on how participating in games and sports helped hone their professional skills.
By David Spark Veteran Tech journalist and founder of Spark Media Solutions, 7/28/2015
Comment2 comments  |  Read  |  Post a Comment
New Phishing Campaign Leverages Google Drive
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Researchers believe technique is geared to take over Google SSO accounts.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/28/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by technolotal
Current Conversations This is terrfiyfing
In reply to: Re: SSL and BGP
Post Your Own Reply
More Conversations
PR Newswire
Lockheed Martin-Led Consortium Builds Secure 'System Of Systems'
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/28/2015
Cyber Boot Camp: Lessons Learned
Marilyn Cohodas, Community Editor, Dark Reading,  7/31/2015
Can't Touch This: 'Hammertoss' Russian Cyberspies Hide In Plain Sight
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/29/2015
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
What 30 Classic Games Can Teach Us about Security
Information security experts share their thoughts on how participating in games and sports helped hone their professional skills. Read >>
Cartoon
Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!
White Papers
Current Issue
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1955
Published: 2015-08-03
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (CPU consumption) via a crafted byte sequence in authentication data.

CVE-2015-1956
Published: 2015-08-03
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (disk consumption) via a crafted byte sequence in authentication data, a different vulnerability than CVE-2015-1958 and CVE-2015-1987.

CVE-2015-1958
Published: 2015-08-03
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (disk consumption) via a crafted byte sequence in authentication data, a different vulnerability than CVE-2015-1956 and CVE-2015-1987.

CVE-2015-1970
Published: 2015-08-03
The IBM WebSphere DataPower XC10 appliance 2.1 through 2.1.0.3 and 2.5 through 2.5.0.4 retains data on SSD cards, which might allow physically proximate attackers to obtain sensitive information by extracting a card and attaching it elsewhere.

CVE-2015-1987
Published: 2015-08-03
IBM MQ Light before 1.0.0.2 allows remote attackers to cause a denial of service (disk consumption) via a crafted byte sequence in authentication data, a different vulnerability than CVE-2015-1956 and CVE-2015-1958.

10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Flash Poll
Video
Slideshows
Twitter Feed