News & Commentary
Latest Content
Page 1 / 2   >   >>
Security Ops Confidence Levels Drop
News  |  9/12/2014  | 
Survey shows most organizations unable to keep up with new and emerging threats from state-sponsored attackers.
Why Email Is Worth Saving
Commentary  |  9/12/2014  | 
What if an Internet-scale, federated policy, authentication, and enforcement framework for trusted email delivery were available? It is.
Veracode Secures $40M In Funding As IPO Looms
News  |  9/12/2014  | 
Security firm plans to increase investments in sales, marketing, and research and development.
Franchising The Chinese APT
News  |  9/11/2014  | 
At least two different cyber espionage gangs in China appear to be employing uniform tools and techniques, FireEye finds.
Home Depot Breach May Not Be Related To BlackPOS, Target
News  |  9/11/2014  | 
New analysis of the malware earlier identified as a BlackPOS variant leads some researchers to believe that they are two different malware families entirely.
Apple Pay: A Necessary Push To Transform Consumer Payments
Commentary  |  9/11/2014  | 
Apple Pay is a strategic move that will rival PayPal and other contenders in the mobile wallet marketplace. The big question is whether consumers and businesses are ready to ditch the plastic.
Privacy, Security & The Geography Of Data Protection
Commentary  |  9/11/2014  | 
Data generation is global, so why do different parts of the world react differently to the same threat of security breaches and backdoors?
Startup Uncovers Flaws In Mobile Apps, Launches New Security Service
Quick Hits  |  9/11/2014  | 
Wandera says only one of seven US employees is given any guidance on mobile security by the employer.
Google: No Breach In Latest Online Dump Of Credentials
Quick Hits  |  9/11/2014  | 
The online leak of some 5 million username and password combinations consisted of mostly stale or older credentials that don't actually work, Google says.
Apple Pay Ups Payment Security But PoS Threats Remain
News  |  9/10/2014  | 
Apple's new contactless payment tech will not stop point-of-sale breaches like Home Depot and UPS, but it could make those breaches less valuable to attackers.
Security Growing Pangs Loom For 100K+ Sites With Newly Untrusted Certificates
News  |  9/10/2014  | 
Mozilla revokes 1024-bit root certificates in bid to improve Firefox security and similar changes to come for Chrome as Google plans to dump SHA-1 certificates.
Attack Steals Online Banking Credentials From SMBs
News  |  9/10/2014  | 
The "Peter Pan" phish employs Dridex malware, experts say.
InfoSec Book Club: What’s On Your Fall Reading List?
Slideshows  |  9/9/2014  | 
Dark Reading community members share the books that inform and inspire their decisions and interactions as security professionals.
Study: 15 Million Devices Infected With Mobile Malware
Quick Hits  |  9/9/2014  | 
Sixty percent of the infected devices run Android.
Salesforce Passwords At Risk From Dyre
News  |  9/9/2014  | 
Bank credential-stealing malware evolves into targeting SaaS users.
Black Hat & DEF CON: 3 Lessons From A Newbie
Commentary  |  9/9/2014  | 
Security conferences are a lot like metal concerts: Your parents are terrified you're going to die because everyone looks scary, but 98 percent of attendees are really nice people who want to help you learn.
Dark Reading Radio: CISO James Christiansen Shares Experiences
Commentary  |  9/9/2014  | 
Former CISO at GM, Visa, and Experian answers questions about building security programs in large enterprises.
Mobile, Cloud, Partners: Where’s The Weak Link?
Infographics  |  9/9/2014  | 
Your perimeter now incorporates mobile devices, cloud services, and partner networks, so it should be clear that the “moat” method no longer cuts it.
'Kyle & Stan' Parks Malvertising On Amazon, YouTube
Quick Hits  |  9/8/2014  | 
Windows and Macs alike are at risk to sophisticated mutating malware.
UPDATE: Home Depot Confirms Breach; BlackPOS Implicated
Quick Hits  |  9/8/2014  | 
Home Depot confirms there was indeed a breach. Presence of BlackPOS hints that the perpetrators could be the same ones who breached Target.
No End In Sight For Ransomware
Commentary  |  9/8/2014  | 
The screenlocker Kovter, in particular, has shown sharp growth this year. It masquerades as a law enforcement authority and threatens police action if users don’t pay up.
Poll: Significant Insecurity About Internet of Things
Commentary  |  9/5/2014  | 
Fewer than one percent of more than 800 Dark Reading community members are ready for the fast approaching security onslaught of the IoT.
Attacker Infects Healthcare.gov Test Server
News  |  9/5/2014  | 
Federal officials say no consumer data was impacted and second open enrollment period on HealthCare.gov will not be affected.
4 Hurdles To Securing The Internet Of Things
News  |  9/4/2014  | 
Why locking down even the tiniest embedded device is a tall order.
BackOff Not To Blame For GoodWill Breach
News  |  9/4/2014  | 
Rawpos, a "very low risk" infostealer, is responsible for the compromise of roughly 868,000 credit cards.
In Cloud We Trust: A New Model
Commentary  |  9/4/2014  | 
The solution to the problem of data security in the public cloud will require more than a traditional compliance-driven approach.
Home Depot, Other Retailers Get Social Engineered
News  |  9/3/2014  | 
Famed annual contest reveals how many retailers lack sufficient defenses against social engineering.
In China, Cybercrime Underground Activity Doubled In 2013
News  |  9/3/2014  | 
Forget intelligence gathering. Financially motivated cybercrime is booming behind the Great Wall.
Celeb Hack: Is Apple Telling All It Knows?
Commentary  |  9/3/2014  | 
Did Apple have a system-wide data breach? No. Was it complicit through an appalling security lapse by not defending against brute force attacks? You’re darn tootin'!
Apple Not Hacked In Celebrity Nude Photo Breaches
News  |  9/2/2014  | 
"Very targeted attack" on celebrities' Apple usernames, passwords, security questions -- iCloud, Find My iPhone not breached, Apple says.
Home Depot The Latest Hack Victim?
Quick Hits  |  9/2/2014  | 
Home improvement chain--along with law enforcement and banks--are investigating 'unusual activity.'
“Contactless” HCE Payments Promise Simplicity But Is It Secure?
Commentary  |  9/2/2014  | 
Host Card Emulation is a powerful and flexible technology, but like most software-dependent solutions, it can be hacked and exploited.
How To Create A Risk 'Pain Chart'
News  |  8/29/2014  | 
Consultant John Pironti outlines how to execute a risk-based approach to defending corporate assets.
Why Are Security Pros Blasé About Compliance?
Commentary  |  8/29/2014  | 
A survey of 500 IT and security decision makers in the UK and US shows that a majority are in the dark about regulatory requirements for their business organization.
CryptoWall More Pervasive, Less Profitable Than CryptoLocker
News  |  8/28/2014  | 
The former CryptoLocker wannabe has netted 625,000 infected systems and more than $1 million in ransoms.
Feds Investigating Breaches At JPMorgan, Other Banks
News  |  8/28/2014  | 
JPMorgan working with FBI, US Secret Service to determine scope of breach, but other newly reported intrusions at financial firms may not be related.
Backoff, Dairy Queen, UPS & Retail's Growing PoS Security Problem
News  |  8/27/2014  | 
Retail brands are trying to pass the buck for data security to banks and franchisees, say some experts.
10 Common Software Security Design Flaws
News  |  8/27/2014  | 
Google, Twitter, and others identify the most common software design mistakes -- compiled from their own organizations -- that lead to security woes and how to avoid them.
How I Hacked My Home, IoT Style
Commentary  |  8/27/2014  | 
It didn’t take long to find a score of vulnerabilities in my home entertainment, gaming, and network storage systems.
Online Tools For Bug Disclosure Abound
News  |  8/26/2014  | 
What's driving the bounty of software vulnerability disclosure offerings today from Bugcrowd, HackerOne, and Synack.
Sony, XBox Victims Of DDoS, Hacktivist Threats
Quick Hits  |  8/26/2014  | 
Hacktivists from Anonymous and from a presumed Islamic extremist group targeted a variety of online gaming services.
Top 5 Reasons Your Small Business Website is Under Attack
Commentary  |  8/26/2014  | 
There is no such thing as “too small to hack.” If a business has a website, hackers can exploit it.
27 Million South Koreans Victimized In Online Gaming Heist
News  |  8/25/2014  | 
16 suspects arrested in South Korea as authorities pursue additional suspects, including a Chinese hacker.
Breach of Homeland Security Background Checks Raises Red Flags
News  |  8/25/2014  | 
"We should be burning down the house over this," says a GRC expert.
All In For The Coming World of 'Things'
Commentary  |  8/25/2014  | 
At a Black Hat round table, experts discuss the strategies necessary to lock down the Internet of Things, the most game-changing concept in Internet history.
Healthcare Industry, Feds Talk Information Sharing
News  |  8/22/2014  | 
Representatives from the healthcare industry as well as government discuss importance of threat intelligence-sharing in light of the Community Health Systems breach.
JP Morgan Targeted In New Phishing Campaign
Quick Hits  |  8/22/2014  | 
Double-whammy 'Smash and Grab' hits targets with two ways to steal credentials.
Flash Poll: CSOs Need A New Boss
Commentary  |  8/22/2014  | 
Only one out of four respondents to our flash poll think the CSO should report to the CIO.
Hacker Or Military? Best Of Both In Cyber Security
Commentary  |  8/21/2014  | 
How radically different approaches play out across the security industry.
51 UPS Stores' Point-of-Sale Systems Breached
News  |  8/21/2014  | 
Customers will not receive individual breach notifications.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1556
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in Synology Photo Station 5 for DiskStation Manager (DSM) 3.2-1955 allows remote attackers to inject arbitrary web script or HTML via the name parameter to photo/photo_one.php.

CVE-2014-2008
Published: 2014-09-12
SQL injection vulnerability in confirm.php in the mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to execute arbitrary SQL commands via the TID parameter.

CVE-2014-2009
Published: 2014-09-12
The mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to obtain credentials, the installation path, and other sensitive information via a direct request to api/curllog.log.

CVE-2014-4735
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in MyWebSQL 3.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the table parameter to index.php.

CVE-2014-5259
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in cattranslate.php in the CatTranslate JQuery plugin in BlackCat CMS 1.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the msg parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant