10 Ways to Prevent Your Mobile Devices From Becoming Bots
Paul Vixie: How CISOs Can Use DNS to Up Security
Attacking Developers Using 'Shadow Containers'
7 Takeaways From The Equifax Data Breach
Dark Reading INsecurity Conference Registration Now Open
News & Commentary
Why Size Doesn't Matter in DDoS Attacks
Nicolai Bezsonoff, General Manager, Security Solutions, NeustarCommentary
Companies both large and small are targets. Never think "I'm not big enough for a hacker's attention."
By Nicolai Bezsonoff General Manager, Security Solutions, Neustar, 9/21/2017
Comment0 comments  |  Read  |  Post a Comment
SMBs Paid $301 Million to Ransomware Attackers
Dark Reading Staff, Quick Hits
But small- to midsized businesses are taking a tougher stand against ransomware attacks, according to a survey released today of the 2016-2017 period.
By Dark Reading Staff , 9/21/2017
Comment0 comments  |  Read  |  Post a Comment
OPM Data Breach Lawsuit Tossed, Fed Plaintiffs will Appeal
Dark Reading Staff, Quick Hits
A judge ruled federal employees cannot sue for damages from the 2015 Office of Personnel Management data breach.
By Dark Reading Staff , 9/21/2017
Comment3 comments  |  Read  |  Post a Comment
Iranian Cyberspy Group Targets Aerospace, Energy Firms
Jai Vijayan, Freelance writerNews
APT33 focused on gathering information to bolster Iran's aviation industry and military decision-making capability, FireEye says.
By Jai Vijayan Freelance writer, 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
Cisco SMI Still Exposing Network Switches Online
Kelly Sheridan, Associate Editor, Dark ReadingNews
The high number of exposed and vulnerable devices online has remained largely unchanged since researchers began exploring SMI in 2010.
By Kelly Sheridan Associate Editor, Dark Reading, 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
Mobile Ransomware Hits Browsers with Old-School Techniques
Kelly Sheridan, Associate Editor, Dark ReadingNews
Several types of malware sold on the dark Web advertise the ability to spy on Android smartphones, encrypt files, and demand payment.
By Kelly Sheridan Associate Editor, Dark Reading, 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
Artificial Intelligence: Getting the Results You Want
Lee Fisher, Security business leader EMEA Juniper Networks
Finding a vendor that doesnt claim to do AI is hard these days. But getting the benefits you need and expect is even harder.
By Lee Fisher Security business leader EMEA Juniper Networks , 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
Software Assurance: Thinking Back, Looking Forward
Kevin E. Greene, Cyber Security Thought LeaderCommentary
Ten personal observations that aim to bolster state-of-the-art and state-of-practice in application security.
By Kevin E. Greene Cyber Security Thought Leader, 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
SecureAuth to Merge with Core Security
Dawn Kawamoto, Associate Editor, Dark ReadingNews
K1 Investment Management, which owns Core Security, plans to acquire the identity management and authentication company for more than $200 million.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Every second, 122 records are exposed in breaches around the globe, a new report shows. And that's doesn't even include the new Equifax breach data.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/20/2017
Comment4 comments  |  Read  |  Post a Comment
Get Serious about IoT Security
Derek Manky, Global Security Strategist, FortinetCommentary
These four best practices will help safeguard your organization in the Internet of Things.
By Derek Manky Global Security Strategist, Fortinet, 9/20/2017
Comment3 comments  |  Read  |  Post a Comment
10 Hot Cybersecurity Funding Rounds in Q3
Jai Vijayan, Freelance writer
The first two quarters of 2017 have been the most active ever in five years from a cybersecurity investment standpoint. Here's how the third quarter has shaped up.
By Jai Vijayan Freelance writer, 9/20/2017
Comment1 Comment  |  Read  |  Post a Comment
Avast-Owned Piriform Releases CCleaner Security Update
Dark Reading Staff, Quick Hits
The Avast subsidiary has released two new versions of CCleaner following the discovery of a supply-chain attack.
By Dark Reading Staff , 9/19/2017
Comment1 Comment  |  Read  |  Post a Comment
New Spam Campaign Literally Doubles Down on Ransomware
Kelly Sheridan, Associate Editor, Dark ReadingNews
An upgraded spam campaign alternates Locky and FakeGlobe ransomware, forcing victims to pay twice or lose all their data.
By Kelly Sheridan Associate Editor, Dark Reading, 9/19/2017
Comment0 comments  |  Read  |  Post a Comment
GDPR & the Rise of the Automated Data Protection Officer
Terry Ray, Chief Technology Officer, ImpervaCommentary
Can artificial intelligence and machine learning solve the skills shortage as the EU's General Data Protection Regulation deadline approaches?
By Terry Ray Chief Technology Officer, Imperva, 9/19/2017
Comment0 comments  |  Read  |  Post a Comment
Viacom's Secret Cloud Keys Exposed
Dark Reading Staff, Quick Hits
The entertainment giant is the latest company to misconfigure its Amazon Web Services S3 cloud storage bucket.
By Dark Reading Staff , 9/19/2017
Comment1 Comment  |  Read  |  Post a Comment
Siemens' New ICS/SCADA Security Service a Sign of the Times
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Major ICS/SCADA vendors are entering the managed security services business with cloud-based offerings for energy and other industrial sectors.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/19/2017
Comment0 comments  |  Read  |  Post a Comment
How Apple's New Facial Recognition Technology Will Change Enterprise Security
Shimrit Tzur-David, CTO & Co-founder, Secret Double OctopusCommentary
Expect a trickle-down effect, as tech similar to Face ID becomes offered outside of Apple.
By Shimrit Tzur-David CTO & Co-founder, Secret Double Octopus, 9/19/2017
Comment0 comments  |  Read  |  Post a Comment
Equifax Exec Departures Raise Questions About Responsibility for Breach
Jai Vijayan, Freelance writerNews
Disclosed details suggest a failure by the technology team but senior executives and the board are not above responsibility as well, experts say.
By Jai Vijayan Freelance writer, 9/18/2017
Comment1 Comment  |  Read  |  Post a Comment
Avast CCleaner Compromised Amid Rise in Supply Chain Threats
Kelly Sheridan, Associate Editor, Dark ReadingNews
Attackers somehow hacked the build system of Avast's CCleaner to deliver malware, potentially affecting millions of users.
By Kelly Sheridan Associate Editor, Dark Reading, 9/18/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
FTC Opens Probe into Equifax Data Breach
Jai Vijayan, Freelance writer,  9/14/2017
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
The Hunt for IoT: The Rise of Thingbots
Across all of our research, every indication is that today's "thingbots" - botnets built exclusively from Internet of Things devices - will become the infrastructure for a future Darknet. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack. Read >>
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Jan, check this out! I found an unhackable PC.
White Papers
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

The Dark Reading Security Spending Survey
The Dark Reading Security Spending Survey
Enterprises are spending an unprecedented amount of money on IT security where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download the report and find out what they had to say.
Flash Poll
Video
Slideshows
Twitter Feed