IoT
News & Commentary
Tunneling Through The "Walls" Of IoT In The Enterprise
Jose Nazario, Director of Security Research at FastlyCommentary
The movie "Die Hard" has a thing or two to teach us about the pitfalls of the Internet of Things.
By Jose Nazario Director of Security Research at Fastly, 2/22/2017
Comment0 comments  |  Read  |  Post a Comment
Stolen Health Record Databases Sell For $500,000 In The Deep Web
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Electronic health record databases proving to be some of the most lucrative stolen data sets in cybercrime underground.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/21/2017
Comment1 Comment  |  Read  |  Post a Comment
After Election Interference, RSA Conference Speakers Ask What Comes Next
Sara Peters, Senior Editor at Dark ReadingNews
Election-tampering called 'a red line we should not allow anyone to cross.'
By Sara Peters Senior Editor at Dark Reading, 2/17/2017
Comment1 Comment  |  Read  |  Post a Comment
IoT Security: A Ways To Go, But Some Interim Steps For Safety
Terry Sweeney, Contributing EditorNews
The Internet of Things remains vulnerable to botnets and malware, but Cisco's Anthony Grieco offers some tips to keep networks and users more secure
By Terry Sweeney Contributing Editor, 2/15/2017
Comment0 comments  |  Read  |  Post a Comment
The 10 Most Cyber-Exposed Cities In The US
Ericka Chickowski, Contributing Writer, Dark ReadingNews
At RSAC, Trend Micro researchers showcase municipalities with the highest percentage of discoverable devices and systems connected via the public Internet.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/15/2017
Comment0 comments  |  Read  |  Post a Comment
National Security, Regulation, Identity Top Themes At Cloud Security Summit
Sara Peters, Senior Editor at Dark ReadingNews
Gen. Keith Alexander gives Trump a thumbs-up and Cloud Security Alliance releases a new application.
By Sara Peters Senior Editor at Dark Reading, 2/13/2017
Comment0 comments  |  Read  |  Post a Comment
You Can't Hire Your Way Out Of A Skills Shortage ... Yet
Jim Zimmermann, Solutions Principal, IT and Digital Solutions, SkillsoftCommentary
It will take much effort to fix the IT and cybersecurity talent crisis, but it is possible.
By Jim Zimmermann Solutions Principal, IT and Digital Solutions, Skillsoft, 2/13/2017
Comment1 Comment  |  Read  |  Post a Comment
New Bug Bounty Program Targets IoT Security
Kelly Sheridan, Associate Editor, InformationWeekNews
GeekPwn bug bounty program aims to collect Internet of Things security vulnerabilities, and highlight mistakes to vendors.
By Kelly Sheridan Associate Editor, InformationWeek, 2/13/2017
Comment0 comments  |  Read  |  Post a Comment
Cloud Security & IoT: A Look At What Lies Ahead
Bill Kleyman, Chief Technology Officer, MTM TechnologiesCommentary
In the brave new world of cloud, security teams must be as agile as possible. This means leveraging proactive monitoring tools, locking down access points, and forecasting requirements
By Bill Kleyman Chief Technology Officer, MTM Technologies, 1/18/2017
Comment0 comments  |  Read  |  Post a Comment
Advances In SSL: 5 Strategies For Secure, High-Performance Load Balancers
Ranga Rajagopalan, Chief Technology Officer, Avi NetworksCommentary
Today, even Netflix is streaming hit movies and TV shows via encrypted connections! Heres how to manage higher volumes of encrypted traffic without bogging down your network.
By Ranga Rajagopalan Chief Technology Officer, Avi Networks, 1/17/2017
Comment2 comments  |  Read  |  Post a Comment
Free IoT Vulnerability Scanner Hunts Enterprise Threats
Kelly Sheridan, Associate Editor, InformationWeekQuick Hits
A free IoT scanner from BeyondTrust looks for at-risk devices so organizations can pinpoint and address vulnerabilities.
By Kelly Sheridan Associate Editor, InformationWeek, 1/12/2017
Comment0 comments  |  Read  |  Post a Comment
IoT, Foreign Actors, Insider Threats Shape 2017 Risk Management
Kelly Sheridan, Associate Editor, InformationWeekNews
A new report aims to inform risk management decisions for 2017 by identifying potential security threats and their anticipated effect on businesses.
By Kelly Sheridan Associate Editor, InformationWeek, 1/11/2017
Comment0 comments  |  Read  |  Post a Comment
'Molecular' Cybersecurity Vs. Information Cybersecurity
David Zahn, General Manager of Cybersecurity at PASCommentary
When it comes to industrial processes, security begins at the molecular level.
By David Zahn General Manager of Cybersecurity at PAS, 1/10/2017
Comment0 comments  |  Read  |  Post a Comment
Naughty & Nice: Dark Reading Caption Contest Winners
John Klossner, CartoonistCommentary
It was a tough job choosing among our strongest field yet, with more than 100 submissions. And the winners are
By John Klossner Cartoonist, 1/7/2017
Comment1 Comment  |  Read  |  Post a Comment
FTC Charges D-Link With Unsecure Routers And IP Cameras
Dark Reading Staff, Quick Hits
Federal Trade Commission voices concerns in US district court that D-Link products had put consumers' privacy at risk.
By Dark Reading Staff , 1/6/2017
Comment0 comments  |  Read  |  Post a Comment
Why Ransomware Is Only Going To Get Worse
Rick Orloff, VP, Chief Security Officer, and Chief Privacy Officer at Code42Commentary
The meteoric rise of the problem stems from a lack of preparedness and simple economics.
By Rick Orloff VP, Chief Security Officer, and Chief Privacy Officer at Code42, 1/5/2017
Comment0 comments  |  Read  |  Post a Comment
10 Things InfoSec Pros Can Celebrate About 2016
Sara Peters, Senior Editor at Dark ReadingNews
There were a few items that passed for good news this year.
By Sara Peters Senior Editor at Dark Reading, 12/29/2016
Comment2 comments  |  Read  |  Post a Comment
5 Ways The Cyber-Threat Landscape Shifted In 2016
Jai Vijayan, Freelance writer
IoT botnets and turnkey phishing services were just some of the ways the bad guys stayed ahead in 2016
By Jai Vijayan Freelance writer, 12/19/2016
Comment5 comments  |  Read  |  Post a Comment
The Internet Of Things: When Bigger Is Not Better
Paul Vixie, Chairman & CEO, Farsight Security, Inc.Commentary
What happens when 10,000 companies add programmability and connectivity to their products, and we increase the Internets attack surface by a million times or more?
By Paul Vixie Chairman & CEO, Farsight Security, Inc., 12/13/2016
Comment0 comments  |  Read  |  Post a Comment
Whats Naughty & Nice About The Internet Of Things
Mark Baugher, Principal Security Engineer, Greenwave SystemsCommentary
It's easy to catalogue the worst IoT security hazards. But that's not the whole story.
By Mark Baugher Principal Security Engineer, Greenwave Systems, 12/12/2016
Comment6 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Bertaandberta
Current Conversations Excellent information! Thank you
In reply to: 10 Things
Post Your Own Reply
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.