Cracking 2FA: How It's Done and How to Stay Safe
Dark Reading Conference Call for Speakers Closes Friday
7 Tools for Stronger IoT Security, Visibility
Risky Business: Deconstructing Ray Ozzie's Encryption Backdoor
8 Ways Hackers Can Game Air Gap Protections
News & Commentary
Bridging the Cybersecurity Talent Gap
Shelley Westman, Principal, Cybersecurity, at EYCommentary
There's no one surefire way of fixing the problem, which endangers everyone's security. There are, however, several options we should try.
By Shelley Westman Principal, Cybersecurity, at EY, 5/25/2018
Comment0 comments  |  Read  |  Post a Comment
Most Expensive Data Breaches Start with Third Parties: Report
Kelly Sheridan, Staff Editor, Dark ReadingNews
Data breach costs increased 24% for enterprise victims and 36% for SMBs from 2017 to 2018, researchers found.
By Kelly Sheridan Staff Editor, Dark Reading, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
DOJ Sinkholes VPNFilter Control Servers Found in US
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
The US Department of Justice said the move aims to thwart the spread of the botnet as part of its investigation into Russian nation-state hacking group APT28 aka Fancy Bear.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
GDPR, WHOIS & the Impact on Merchant Risk Security Monitoring
Ron Teicher, CEO & Founder, EverCompliantCommentary
The EU's General Data Protection Regulation will make it harder for law enforcement, forensic investigators, and others to track down everything from credit card fraud to child porn rings.
By Ron Teicher CEO & Founder, EverCompliant, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
Privacy Survey Says: Americans Don't Want to Sell Their Data
Dark Reading Staff, Quick Hits
A new survey shows the extent to which Americans are reluctant to sell their personal information for any price.
By Dark Reading Staff , 5/24/2018
Comment1 Comment  |  Read  |  Post a Comment
A Data Protection Officer's Guide to the Post-GDPR Deadline Reality
Jen Brown, Compliance and Data Protection Officer at Sumo LogicCommentary
The EU's General Data Protection Regulation deadline is here -- now what? These four tips can help guide your next steps.
By Jen Brown Compliance and Data Protection Officer at Sumo Logic, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
Malwarebytes Buys Binisoft for Firewall Management
Dark Reading Staff, Quick Hits
Vendor plans to integrate Binisoft's Windows Firewall Control into the Malwarebytes endpoint protection platform.
By Dark Reading Staff , 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Users are terrible at passwords and the problem is only getting worse, according to an expansive study of more than 100 million passwords and their owners.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/24/2018
Comment2 comments  |  Read  |  Post a Comment
Fraud Drops 76% for Merchants Using EMV, Says Visa
Dark Reading Staff, Quick Hits
A new report from Visa says that the shift to chip cards has resulted in dramatically reduced credit card fraud levels.
By Dark Reading Staff , 5/23/2018
Comment1 Comment  |  Read  |  Post a Comment
Growing Job Pressures Increase Risk of Burnout for Cybersecurity Professionals
Jai Vijayan, Freelance writerNews
A new Trustwave survey shows information security executives and practitioners are under increasing pressure from trying to keep up with threats and compliance mandates.
By Jai Vijayan Freelance writer, 5/23/2018
Comment1 Comment  |  Read  |  Post a Comment
The Good & Bad News about Blockchain Security
Michael Raziel, CTO, CyberGuild VenturesCommentary
Blockchain technology promises many things. But to succeed, it must offer users a better plan against hackers.
By Michael Raziel CTO, CyberGuild Ventures, 5/23/2018
Comment0 comments  |  Read  |  Post a Comment
Destructive 'VPNFilter' Attack Network Uncovered
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
More than 500K home/SOHO routers and storage devices worldwide commandeered in potential nation-state attack weapon - with Ukraine in initial bullseye.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/23/2018
Comment0 comments  |  Read  |  Post a Comment
What Should Post-Quantum Cryptography Look Like?
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/23/2018
Comment1 Comment  |  Read  |  Post a Comment
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451Commentary
Most security professionals in a recent survey said that threat intelligence doesn't work. So why all the hype?
By Chris McDaniels Chief Information Security Officer of Mosaic451, 5/23/2018
Comment2 comments  |  Read  |  Post a Comment
Windows 10 Adoption Grew 75%, Adobe Flash Plummeted 188% in 2017: Report
Kelly Sheridan, Staff Editor, Dark ReadingNews
Authentication data reveals an increase in Apple devices, poor mobile security, and the rapid disappearance of Flash from browsers.
By Kelly Sheridan Staff Editor, Dark Reading, 5/23/2018
Comment1 Comment  |  Read  |  Post a Comment
6 Steps for Applying Data Science to Security
Steve Zurier, Freelance Writer
Two experts share their data science know-how in a tutorial focusing on internal DNS query analysis.
By Steve Zurier Freelance Writer, 5/23/2018
Comment0 comments  |  Read  |  Post a Comment
LA County Nonprofit Exposes 3.2M PII Files via Unsecured S3 Bucket
Dark Reading Staff, Quick Hits
A misconfiguration accidentally compromised credentials, email addresses, and 200,000 rows of notes describing abuse and suicidal distress.
By Dark Reading Staff , 5/23/2018
Comment1 Comment  |  Read  |  Post a Comment
New Spectre Variants Add to Vulnerability Worries
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Variants 3a and 4 build on the Spectre foundation, but how worried should enterprise security professionals really be?
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/22/2018
Comment0 comments  |  Read  |  Post a Comment
US Senator to DOD CIO: 'Take Immediate Action' on HTTPS
Kelly Sheridan, Staff Editor, Dark ReadingNews
US Senator Ron Wyden pens a letter to the Department of Defense CIO, urging stronger security on public-facing government sites.
By Kelly Sheridan Staff Editor, Dark Reading, 5/22/2018
Comment0 comments  |  Read  |  Post a Comment
Las Vegas Most Insecure Cyber City in US; St. Louis Least Vulnerable
Jai Vijayan, Freelance writerNews
Forty-three percent chance of users connecting to high or medium-risk networks in Las Vegas - compared to less than 1% risk in least vulnerable areas, Coronet says.
By Jai Vijayan Freelance writer, 5/22/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Cloud Misconceptions Are Pervasive Across Enterprises
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it. Read >>
Partner Perspectives
What's This?
Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack. Read >>
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Dark Reading Live EVENTS
INsecurity 2018 A Dark Reading Conference | October 23-25 at the Sheraton Grand Chicago
INsecurity is for the defenders of enterprise securitythe IT team members tasked with protecting critical data from cyber threatsand will offer real-world case studies, peer sharing and practical, actionable content for IT teams and professionals seeking better, more effective practices for defending enterprise data.
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
White Papers
Current Issue
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3961
PUBLISHED: 2018-05-25
Cross-Site Scripting (XSS) vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows authenticated users to allow arbitrary HTML code to be reflected in the response web page via crafted user input of attributes.
CVE-2018-11468
PUBLISHED: 2018-05-25
The __mkd_trim_line function in mkdio.c in libmarkdown.a in DISCOUNT 2.2.3a allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file, as demonstrated by mkd2html.
CVE-2018-6664
PUBLISHED: 2018-05-25
Application Protections Bypass vulnerability in Microsoft Windows in McAfee Data Loss Prevention (DLP) Endpoint before 10.0.500 and DLP Endpoint before 11.0.400 allows authenticated users to bypass the product block action via a command-line utility.
CVE-2018-6674
PUBLISHED: 2018-05-25
Privilege Escalation vulnerability in Microsoft Windows client in McAfee VirusScan Enterprise (VSE) 8.8 allows local users to view configuration information in plain text format via the GUI or GUI terminal commands.
CVE-2018-1133
PUBLISHED: 2018-05-25
An issue was discovered in Moodle 3.x. A Teacher creating a Calculated question can intentionally cause remote code execution on the server, aka eval injection.
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Flash Poll
Video
Slideshows
Twitter Feed