Clinton, Trump Debate 'Twenty-First Century War' Of Cyberattacks
25 Emerging Security Vendors To Watch
7 New Rules For IoT Safety & Vuln Disclosure
State Of The Exploit Kit
7 Ways Cloud Alters The Security Equation
News & Commentary
EMV: The Anniversary Of One Deadline, The Eve of Another
Sara Peters, Senior Editor at Dark ReadingNews
How merchants and criminals responded since the EMV liability shift for point-of-sale devices one year ago. And what changes can we expect after the liability shift for ATMs, which is just days away?
By Sara Peters Senior Editor at Dark Reading, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
How A Pair Of Cybercriminals Scales Its Carder Business
Jai Vijayan, Freelance writerNews
'Vendetta Brothers' cybercrime duo runs site that offers cards stolen from over 600 banks in 41 countries, FireEye says.
By Jai Vijayan Freelance writer, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Researchers Shoot Down Yahoo Claim Of Nation-State Hack
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
InfoArmor says the attackers who stole a half-billion Yahoo user accounts were seasoned cybercriminals who later sold the booty to an Eastern European nation-state.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
Kelly Sheridan, Associate Editor, InformationWeekNews
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.
By Kelly Sheridan Associate Editor, InformationWeek, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Fear & Loathing In The Cloud
Tim Prendergast, Founder & CEO, Evident.ioCommentary
Whether you've already bought your ticket for the cloud or still have some issues to sort through, fine-tune your security practices to make sure your ride is a smooth one.
By Tim Prendergast Founder & CEO, Evident.io, 9/29/2016
Comment1 Comment  |  Read  |  Post a Comment
A Bug Bounty Reality-Check
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New study shows that bug bounties without a secure application development program and testing can be costly.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Microsoft Launches Cloud-Based Fuzzing
Steve Zurier, Freelance WriterNews
'Project Springfield' debuts at Ignite conference.
By Steve Zurier Freelance Writer, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Russian Hackers Target Citizen Journalists Reporting On Malaysian Airlines Crash
Jai Vijayan, Freelance writerNews
Bellingcats reporters have been hit with spear phishing attacks and account takeover attempts for over a year, ThreatConnect says.
By Jai Vijayan Freelance writer, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
The Real Reasons Why Users Stink At Passwords
Terry Sweeney, Contributing EditorNews
Personality, denial, and authentication-overload are big factors, new study finds.
By Terry Sweeney Contributing Editor, 9/28/2016
Comment9 comments  |  Read  |  Post a Comment
Hacking The Polls: Where US Voting Processes Fall Short
Jeff Schilling, Chief of Operations and Security, ArmorCommentary
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.
By Jeff Schilling Chief of Operations and Security, Armor, 9/28/2016
Comment5 comments  |  Read  |  Post a Comment
More Than Half Of IT Pros Employ Insecure Data Wiping Methods
Emily Johnson, Associate Editor, UBM AmericasNews
Recent study shows most enterprise IT professionals incorrectly believe emptying a Recycle Bin or reformatting a computer drive permanently erases data.
By Emily Johnson Associate Editor, UBM Americas, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Improving Security Savvy Of Execs And Board Room
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jeff Welgan describes how best to improve cybersecurity literacy throughout the C-suite.
By Sara Peters Senior Editor at Dark Reading, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
SWIFT Toughens Customer Security With New Mandatory Rules
Dark Reading Staff, Quick Hits
Measures to include set of core safety standards and assurance framework requiring annual self-attestation by SWIFT members.
By Dark Reading Staff , 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Beep Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
Tom Quillin, Director of Cyber Security Technology & Initiatives, Intel Corporation
The practice of security economics demonstrates how gaps in the security architecture impair business results.
By Tom Quillin Director of Cyber Security Technology & Initiatives, Intel Corporation, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
FBI Probes Bid To Hack Democratic Party Officials Phones, Sources Say
Dark Reading Staff, Quick Hits
Russia-backed criminals again likely to be behind this hacking which, if proven, could involve theft of sensitive data, say the sources.
By Dark Reading Staff , 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Improving The Security Conversation For CIOs, CISOs, & Board Members
Kelly Sheridan, Associate Editor, InformationWeekNews
Cybersecurity is a top priority among enterprise leaders, but it's difficult for them to communicate with IT and security teams if they lack an understanding of key security concepts.
By Kelly Sheridan Associate Editor, InformationWeek, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Clinton, Trump Debate 'Twenty-First Century War' Of Cyberattacks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Lester Holt led with topic of cybersecurity as the first question on national security in Monday's Presidential debate.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/27/2016
Comment4 comments  |  Read  |  Post a Comment
5 Best Practices For Winning the IoT Security Arms Race
Mark Benson & Brian Ericson, Exosite CTO & Software EngineerCommentary
By focusing on a pragmatic approach to security, its possible to develop IoT solutions that will reduce future risk without breaking the bank.
By Mark Benson, CTO, and Brian Ericson, , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 Emerging Security Vendors To Watch
Kelly Sheridan, Associate Editor, InformationWeek
A wave of companies is entering the security field armed with technologies to help businesses mitigate the next generation of cyberattacks. Who are these emerging vendors and what can they offer?
By Kelly Sheridan Associate Editor, InformationWeek, 9/27/2016
Comment3 comments  |  Read  |  Post a Comment
Top 125 Vendors To Watch
InformationWeek Staff, Commentary
InformationWeek and its sister publications Dark Reading and Network Computing have teamed up to bring you a roundup of the hottest vendors in cloud, data management, DevOps, infrastructure, and security. The 125 vendors you'll find here range from established players making strides in their markets to newcomers setting the stage for the future.
By InformationWeek Staff , 9/27/2016
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Ransomware: Coming To A Hospital Near You?
Christiaan Beek, Threat Intelligence Research, Office of the CTO,Intel Security,  9/26/2016
The Real Reasons Why Users Stink At Passwords
Terry Sweeney, Contributing Editor,  9/28/2016
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Cartoon Contest
Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Flash Poll
Video
Slideshows
Twitter Feed