Analytics
News & Commentary
Tesla’s Data Collection May Help In Autopilot Defense
Dark Reading Staff, Quick Hits
The automotive company can use its data collection software to fight liability if involved in Florida crash case, say lawyers.
By Dark Reading Staff , 7/21/2016
Comment0 comments  |  Read  |  Post a Comment
Five Ingredients Of An Intelligence-Driven Security Operations Center: Part 3 In A Series
Brett Kelsey, VP & Chief Technology Officer, Americas, Intel Security
As enterprises adopt new ways of thinking about security, they also must make changes in their operations centers to support the new mindset. Here’s what’s needed.
By Brett Kelsey VP & Chief Technology Officer, Americas, Intel Security, 7/21/2016
Comment0 comments  |  Read  |  Post a Comment
Improving Attribution & Malware Identification With Machine Learning
Sara Peters, Senior Editor at Dark ReadingNews
New technique may be able to predict not only whether unfamiliar, unknown code is malicious, but also what family it is and who it came from.
By Sara Peters Senior Editor at Dark Reading, 7/20/2016
Comment0 comments  |  Read  |  Post a Comment
Security Meaningful If Brought In Early Into Projects: Survey
Dark Reading Staff, Quick Hits
Dell study says many see security as an obstacle to digital initiatives and bring in too late to make an impact.
By Dark Reading Staff , 7/20/2016
Comment0 comments  |  Read  |  Post a Comment
72% of Black Hat Attendees Expect To Be Hit By 'Major' Data Breach Within A Year
Sara Peters, Senior Editor at Dark ReadingCommentary
End users are the biggest weakness, and we're not doing enough to address the problem.
By Sara Peters Senior Editor at Dark Reading, 7/14/2016
Comment1 Comment  |  Read  |  Post a Comment
Context-Rich And Context-Aware Cybersecurity
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 7/14/2016
Comment1 Comment  |  Read  |  Post a Comment
What Security Really Looks Like In Small- To Midsized Businesses
Sean Martin, CISSP | President, imsmartin
Data from internal and external risk assessments provides some insight into how working with SMBs can be risky if security problems aren't uncovered and addressed.
By Sean Martin CISSP | President, imsmartin, 7/6/2016
Comment0 comments  |  Read  |  Post a Comment
West Point Trains Female Cadets For Cyber Branch
Emily Johnson, Associate Editor, UBM AmericasNews
An internship at a Silicon Valley startup is one program aimed at helping close the cybersecurity skills gap.
By Emily Johnson Associate Editor, UBM Americas, 7/5/2016
Comment0 comments  |  Read  |  Post a Comment
Bots Sign Online Petition For Second EU Referendum Post-Brexit
Dark Reading Staff, Quick Hits
Petition website appears to be hijacked by automated bots, thousands of signatures fake, says Parliamentary panel.
By Dark Reading Staff , 6/28/2016
Comment6 comments  |  Read  |  Post a Comment
China Inches Closer To Finalizing Strict Cybersecurity Law
Dark Reading Staff, Quick Hits
Second reading of cybersecurity draft over, measures indicate greater censorship in store for citizens.
By Dark Reading Staff , 6/28/2016
Comment1 Comment  |  Read  |  Post a Comment
Free 'CANSPY' Car-Hacking Tool On Tap
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
French researchers at Black Hat USA will release plug-in tool for testing vehicles for security vulnerabilities.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/27/2016
Comment14 comments  |  Read  |  Post a Comment
FBI: BEC Scam Attempts Amount to $3 Billion
Dark Reading Staff, Quick Hits
FBI warns of rise in business email compromise frauds, says it should be reported immediately.
By Dark Reading Staff , 6/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Ransomware Domains Up By 3,500% In Q1
Sara Peters, Senior Editor at Dark ReadingNews
Cybercriminals know a good thing when they see it.
By Sara Peters Senior Editor at Dark Reading, 6/1/2016
Comment1 Comment  |  Read  |  Post a Comment
Call Centers In The Bullseye
Emily Johnson, Associate Editor, UBM AmericasNews
Cheap set-ups, economic recession, and the US rollout of chip-and-PIN technology, all contribute to dramatic increase in call center fraud.
By Emily Johnson Associate Editor, UBM Americas, 5/12/2016
Comment2 comments  |  Read  |  Post a Comment
Malware At Root Of Bangladesh Bank Heist Lies To SWIFT Financial Platform
Sara Peters, Senior Editor at Dark ReadingNews
Customized malware hid $81 million of wire transfers until the money had been safely laundered.
By Sara Peters Senior Editor at Dark Reading, 4/25/2016
Comment1 Comment  |  Read  |  Post a Comment
MIT AI Researchers Make Breakthrough On Threat Detection
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New artificial intelligence platform offers 3x detection capabilities with 5x fewer false positives.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/18/2016
Comment2 comments  |  Read  |  Post a Comment
How To Monetize Stolen Payment Card Data
Sara Peters, Senior Editor at Dark ReadingNews
The carding value chain not only relies on carders and buyers, but individuals who don't even know they're involved.
By Sara Peters Senior Editor at Dark Reading, 4/12/2016
Comment0 comments  |  Read  |  Post a Comment
7 Lessons From The Panama Papers Leak
Sara Peters, Senior Editor at Dark ReadingNews
Hopefully your organization isn't hiding as many dark secrets as Mossack Fonseca, but the incident still brings helpful hints about data security, breach response, and breach impact.
By Sara Peters Senior Editor at Dark Reading, 4/5/2016
Comment3 comments  |  Read  |  Post a Comment
Machine Learning In Security: Seeing the Nth Dimension in Signatures
Gunter Ollmann,  Chief Security Officer, VectraCommentary
How adding “supervised” machine learning to the development of n-dimensional signature engines is moving the detection odds back to the defender.
By Gunter Ollmann Chief Security Officer, Vectra, 3/31/2016
Comment2 comments  |  Read  |  Post a Comment
Machine Learning In Security: Good & Bad News About Signatures
Gunter Ollmann,  Chief Security Officer, VectraCommentary
Why security teams that rely solely on signature-based detection are overwhelmed by a high number of alerts.
By Gunter Ollmann Chief Security Officer, Vectra, 3/30/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by hugo550
Current Conversations OMG ! NICE
In reply to: nice
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.