News & Commentary
Cloud Security & IoT: A Look At What Lies Ahead
Bill Kleyman, Chief Technology Officer, MTM TechnologiesCommentary
In the brave new world of cloud, security teams must be as agile as possible. This means leveraging proactive monitoring tools, locking down access points, and forecasting requirements
By Bill Kleyman Chief Technology Officer, MTM Technologies, 1/18/2017
Comment0 comments  |  Read  |  Post a Comment
Advances In SSL: 5 Strategies For Secure, High-Performance Load Balancers
Ranga Rajagopalan, Chief Technology Officer, Avi NetworksCommentary
Today, even Netflix is streaming hit movies and TV shows via encrypted connections! Heres how to manage higher volumes of encrypted traffic without bogging down your network.
By Ranga Rajagopalan Chief Technology Officer, Avi Networks, 1/17/2017
Comment2 comments  |  Read  |  Post a Comment
Free IoT Vulnerability Scanner Hunts Enterprise Threats
Kelly Sheridan, Associate Editor, InformationWeekQuick Hits
A free IoT scanner from BeyondTrust looks for at-risk devices so organizations can pinpoint and address vulnerabilities.
By Kelly Sheridan Associate Editor, InformationWeek, 1/12/2017
Comment0 comments  |  Read  |  Post a Comment
IoT, Foreign Actors, Insider Threats Shape 2017 Risk Management
Kelly Sheridan, Associate Editor, InformationWeekNews
A new report aims to inform risk management decisions for 2017 by identifying potential security threats and their anticipated effect on businesses.
By Kelly Sheridan Associate Editor, InformationWeek, 1/11/2017
Comment0 comments  |  Read  |  Post a Comment
'Molecular' Cybersecurity Vs. Information Cybersecurity
David Zahn, General Manager of Cybersecurity at PASCommentary
When it comes to industrial processes, security begins at the molecular level.
By David Zahn General Manager of Cybersecurity at PAS, 1/10/2017
Comment0 comments  |  Read  |  Post a Comment
Naughty & Nice: Dark Reading Caption Contest Winners
John Klossner, CartoonistCommentary
It was a tough job choosing among our strongest field yet, with more than 100 submissions. And the winners are
By John Klossner Cartoonist, 1/7/2017
Comment3 comments  |  Read  |  Post a Comment
FTC Charges D-Link With Unsecure Routers And IP Cameras
Dark Reading Staff, Quick Hits
Federal Trade Commission voices concerns in US district court that D-Link products had put consumers' privacy at risk.
By Dark Reading Staff , 1/6/2017
Comment0 comments  |  Read  |  Post a Comment
Why Ransomware Is Only Going To Get Worse
Rick Orloff, VP, Chief Security Officer, and Chief Privacy Officer at Code42Commentary
The meteoric rise of the problem stems from a lack of preparedness and simple economics.
By Rick Orloff VP, Chief Security Officer, and Chief Privacy Officer at Code42, 1/5/2017
Comment0 comments  |  Read  |  Post a Comment
10 Things InfoSec Pros Can Celebrate About 2016
Sara Peters, Senior Editor at Dark ReadingNews
There were a few items that passed for good news this year.
By Sara Peters Senior Editor at Dark Reading, 12/29/2016
Comment1 Comment  |  Read  |  Post a Comment
5 Ways The Cyber-Threat Landscape Shifted In 2016
Jai Vijayan, Freelance writer
IoT botnets and turnkey phishing services were just some of the ways the bad guys stayed ahead in 2016
By Jai Vijayan Freelance writer, 12/19/2016
Comment4 comments  |  Read  |  Post a Comment
The Internet Of Things: When Bigger Is Not Better
Paul Vixie, Chairman & CEO, Farsight Security, Inc.Commentary
What happens when 10,000 companies add programmability and connectivity to their products, and we increase the Internets attack surface by a million times or more?
By Paul Vixie Chairman & CEO, Farsight Security, Inc., 12/13/2016
Comment0 comments  |  Read  |  Post a Comment
Whats Naughty & Nice About The Internet Of Things
Mark Baugher, Principal Security Engineer, Greenwave SystemsCommentary
It's easy to catalogue the worst IoT security hazards. But that's not the whole story.
By Mark Baugher Principal Security Engineer, Greenwave Systems, 12/12/2016
Comment6 comments  |  Read  |  Post a Comment
Why Video Game Publishers Must Adopt Enforceable Security Standards
Matthew Cook, Co-founder, Panopticon LaboratoriesCommentary
Video games have been under attack at an unprecedented rate since 2012, with cyber criminals playing an increasingly significant role.
By Matthew Cook Co-founder, Panopticon Laboratories, 12/9/2016
Comment4 comments  |  Read  |  Post a Comment
From Carna To Mirai: Recovering From A Lost Opportunity
Bob Rudis & Deral Heiland, Rapid7 Chief Data Scientist & IoT Research LeadCommentary
We had four years to prepare for recent DDoS attacks and failed. How can we learn from our mistakes?
By Bob Rudis & Deral Heiland Rapid7 Chief Data Scientist & IoT Research Lead, 12/8/2016
Comment1 Comment  |  Read  |  Post a Comment
Researchers Find Backdoors, Bugs In Sony, White Box IP Cameras
Jai Vijayan, Freelance writerNews
New vulnerabilities discovered by SEC Consult and Cybereason highight increasing IoT threat to enterprises.
By Jai Vijayan Freelance writer, 12/7/2016
Comment1 Comment  |  Read  |  Post a Comment
US Presidential Commission Outlines Key Cybersecurity Actions For Future Administrations
Kelly Sheridan, Associate Editor, InformationWeekNews
Report outlines ways to lock down critical infrastructure as well as IoT - and the urgent need to expand the security workforce by 2020 with 100,000 new jobs.
By Kelly Sheridan Associate Editor, InformationWeek, 12/6/2016
Comment0 comments  |  Read  |  Post a Comment
Reality Check: Getting Serious About IoT Security
Troy Dearing, Senior Ethical HackerCommentary
The Department of Homeland Security is fully justified in urging security standards for the Internet of Things.
By Troy Dearing Senior Ethical Hacker, 12/5/2016
Comment2 comments  |  Read  |  Post a Comment
MasterCard, Visa Push Gas Pump EMV Migration Deadline To 2020
Dark Reading Staff, Quick Hits
Fuel merchants get three extra years to deploy the secure chip-enabled payment infrastructure in their complex environments.
By Dark Reading Staff , 12/2/2016
Comment0 comments  |  Read  |  Post a Comment
German Telco Probes Possible Hack Of 900,000 Customers
Dark Reading Staff, Quick Hits
Network outages bring down services of many Deutsche Telekom customers raising suspicion that external parties may be involved.
By Dark Reading Staff , 11/29/2016
Comment1 Comment  |  Read  |  Post a Comment
San Francisco Transit Agency Earns Praise For Denying Ransom Request
Jai Vijayan, Freelance writerNews
Despite being forced to give out free rides all weekend, metropolitan transportation authority declines to pay the ransomware operators who locked down ticketing systems.
By Jai Vijayan Freelance writer, 11/28/2016
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Joe Stanganelli
Current Conversations "No, I think he's just a UNIX programmer."
In reply to: lu
Post Your Own Reply
Posted by Joe Stanganelli
Current Conversations "He's busy adding nodes beneath the tree."
In reply to: bt
Post Your Own Reply
More Conversations
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Secure Application Development - New Best Practices
Secure Application Development - New Best Practices
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.