Application Security
News & Commentary
Why Size Doesn't Matter in DDoS Attacks
Nicolai Bezsonoff, General Manager, Security Solutions, NeustarCommentary
Companies both large and small are targets. Never think "I'm not big enough for a hacker's attention."
By Nicolai Bezsonoff General Manager, Security Solutions, Neustar, 9/21/2017
Comment0 comments  |  Read  |  Post a Comment
Mobile Ransomware Hits Browsers with Old-School Techniques
Kelly Sheridan, Associate Editor, Dark ReadingNews
Several types of malware sold on the dark Web advertise the ability to spy on Android smartphones, encrypt files, and demand payment.
By Kelly Sheridan Associate Editor, Dark Reading, 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
Software Assurance: Thinking Back, Looking Forward
Kevin E. Greene, Cyber Security Thought LeaderCommentary
Ten personal observations that aim to bolster state-of-the-art and state-of-practice in application security.
By Kevin E. Greene Cyber Security Thought Leader, 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
Get Serious about IoT Security
Derek Manky, Global Security Strategist, FortinetCommentary
These four best practices will help safeguard your organization in the Internet of Things.
By Derek Manky Global Security Strategist, Fortinet, 9/20/2017
Comment3 comments  |  Read  |  Post a Comment
Viacom's Secret Cloud Keys Exposed
Dark Reading Staff, Quick Hits
The entertainment giant is the latest company to misconfigure its Amazon Web Services S3 cloud storage bucket.
By Dark Reading Staff , 9/19/2017
Comment1 Comment  |  Read  |  Post a Comment
How Apple's New Facial Recognition Technology Will Change Enterprise Security
Shimrit Tzur-David, CTO & Co-founder, Secret Double OctopusCommentary
Expect a trickle-down effect, as tech similar to Face ID becomes offered outside of Apple.
By Shimrit Tzur-David CTO & Co-founder, Secret Double Octopus, 9/19/2017
Comment0 comments  |  Read  |  Post a Comment
Avast CCleaner Compromised Amid Rise in Supply Chain Threats
Kelly Sheridan, Associate Editor, Dark ReadingNews
Attackers somehow hacked the build system of Avast's CCleaner to deliver malware, potentially affecting millions of users.
By Kelly Sheridan Associate Editor, Dark Reading, 9/18/2017
Comment0 comments  |  Read  |  Post a Comment
To Be Ready for the Security Future, Pay Attention to the Security Past
Liz Maida,  Co-founder, CEO & CTO, Uplevel SecurityCommentary
It's easy to just move on to the next problem, ignoring what's happened -- but that's a mistake.
By Liz Maida Co-founder, CEO & CTO, Uplevel Security, 9/18/2017
Comment4 comments  |  Read  |  Post a Comment
Attacks on Android Soared 40% in Q2
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Despite a rise in attacks, the average number of malicious variants remains surprisingly limited, according to a report from Avast.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/15/2017
Comment0 comments  |  Read  |  Post a Comment
Attacking Developers Using 'Shadow Containers'
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Sagie Dulce describes why developers are such attractive targets and how the Docker API can be exploited to use one of developers' favorite tools against them in sneaky, obfuscated attacks.
By Sara Peters Senior Editor at Dark Reading, 9/15/2017
Comment0 comments  |  Read  |  Post a Comment
Microsoft's Azure 'Confidential Computing' Encrypts Data in Use
Kelly Sheridan, Associate Editor, Dark ReadingNews
Early Access program under way for new Azure cloud security feature.
By Kelly Sheridan Associate Editor, Dark Reading, 9/14/2017
Comment0 comments  |  Read  |  Post a Comment
'ExpensiveWall' Attacks More Than 1 Million Android Users
Dark Reading Staff, Quick Hits
New Android malware variant registers users for paid services without their permission and sends bogus premium SMS messages.
By Dark Reading Staff , 9/14/2017
Comment0 comments  |  Read  |  Post a Comment
'Bashware' Undermines Windows 10 Security Via Linux Subsystem
Jai Vijayan, Freelance writerNews
New WSL feature in Windows 10 gives attackers a way to run malware without being detected by any current endpoint security tools, Check Point says.
By Jai Vijayan Freelance writer, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
Trump Orders Removal of Kaspersky Products from Federal Systems
Dark Reading Staff, Quick Hits
The president cites concern that the Russia-based company could be influenced by the Kremlin.
By Dark Reading Staff , 9/13/2017
Comment1 Comment  |  Read  |  Post a Comment
5 Problems That Keep CISOs Awake at Night
Joshua Douglas, Chief Strategy Officer, RaytheonCommentary
The last few years have shown a big difference in the way cyber-risks are acknowledged, but progress still needs to be made.
By Joshua Douglas Chief Strategy Officer, Raytheon, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
China to Create Data Repository to Log Cyberattacks
Dark Reading Staff, Quick Hits
Telcos, government agencies, Internet companies, and domain-name organizations to file cybersecurity information.
By Dark Reading Staff , 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
Shopify Risk Director Talks Ecommerce, Bug Bounty Program
Kelly Sheridan, Associate Editor, Dark ReadingNews
Andrew Dunbar shares his experience growing a retail-focused security team, and combating the many threats facing online merchants and their customers.
By Kelly Sheridan Associate Editor, Dark Reading, 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
The 'Team of Teams' Model for Cybersecurity
Matthew Doan and Gary Barnabo, Commerical Cyber  Strategists, Booz Allen HamiltonCommentary
Security leaders can learn some valuable lessons from a real-life military model.
By Matthew Doan and Gary Barnabo Commerical Cyber Strategists, Booz Allen Hamilton, 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
Tesla Hacks: The Good, The Bad, & The Ugly
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Keen Security Lab found multiple holes in the isolation layer Tesla uses to protect drive systems from infotainment systems, but were impressed by the auto company's security in other ways.
By Sara Peters Senior Editor at Dark Reading, 9/12/2017
Comment1 Comment  |  Read  |  Post a Comment
Credit Card Hacker Roman Seleznev Enters More Guilty Pleas
Dawn Kawamoto, Associate Editor, Dark ReadingNews
The Russian hacker already hit with a 27-year prison sentence for credit card hacking pleads guilty to two more charges.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/11/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
To Be Ready for the Security Future, Pay Attention to the Security Past
Liz Maida, Co-founder, CEO & CTO, Uplevel Security,  9/18/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Jan, check this out! I found an unhackable PC.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.