News & Commentary
Latest Content
Page 1 / 2   >   >>
How Jihadists Operate Online And Under The Radar: Report
News  |  7/22/2016  | 
Secure browsers, VPNs, protected email apps, and mobile security apps are just tip of iceberg, Flashpoint report shows.
5 Ways To Protect HR From Ransomware
News  |  7/22/2016  | 
Bad actors are now looking to hold for ransom sensitive information stored in personnel records in the human resources department and other highly sensitive corporate operations.
7 Ways To Lock Down Your Privileged Accounts
Slideshows  |  7/22/2016  | 
Admin passwords contained within privileged accounts can open up the keys to the kingdom to determined attackers. Here's how to stop them.
5 Failsafe Techniques For Interviewing Security Candidates
Commentary  |  7/22/2016  | 
Filling critical information security roles with the right people is never easy. But learning how to separate the 'wheat from the chaff' is a smart step in the right direction.
Asia Mulls Europol-Style Agency To Fight Cybercrime
Quick Hits  |  7/22/2016  | 
Asian ministers hold closed-door meeting in Singapore to chalk out strategy for such an organization.
Auto Industry ISAC Releases Best Practices For Connected Vehicle Cybersecurity
News  |  7/21/2016  | 
Goal is to provide car manufactures with guidelines for protecting modern vehicles against emerging cyber threats
Majority Of Companies Say Trade Secrets Likely Compromised
News  |  7/21/2016  | 
About 60 percent of companies in a survey by Ponemon and Kilpatrick Townsend say at least some of their trade secrets are likely in the hands of rivals
Tools & Training To ‘Hack Yourself’ Into Better Security
Commentary  |  7/21/2016  | 
How to teach your blue team to think like the red team when your network is under attack and time is your most valuable asset.
Tesla’s Data Collection May Help In Autopilot Defense
Quick Hits  |  7/21/2016  | 
The automotive company can use its data collection software to fight liability if involved in Florida crash case, say lawyers.
Firefox To Start Blocking Invisible Flash Content
Quick Hits  |  7/21/2016  | 
This move is part of campaign by Mozilla to close the door on Flash completely by 2017.
Security Gets Political With Hacks, Darknet Sales
News  |  7/21/2016  | 
As presidential campaigns get into full swing, neither party is immune to online chicanery -- and neither are voters
Five Ingredients Of An Intelligence-Driven Security Operations Center: Part 3 In A Series
Partner Perspectives  |  7/21/2016  | 
As enterprises adopt new ways of thinking about security, they also must make changes in their operations centers to support the new mindset. Here’s what’s needed.
National Governors Association Seeks Higher Profile on Cybersecurity
News  |  7/20/2016  | 
NGA’s new chairman Virginia Gov. Terry McAuliffe says states can play a pivotal role in cybersecurity, including emergency response, workforce development and protecting health care data.
Improving Attribution & Malware Identification With Machine Learning
News  |  7/20/2016  | 
New technique may be able to predict not only whether unfamiliar, unknown code is malicious, but also what family it is and who it came from.
5 ‘Mr. Robot’ Hacks That Could Happen in Real Life
Commentary  |  7/20/2016  | 
As season two of the popular TV series gets underway, we reality-check anti-hero Elliot’s hacking prowess against real-life security and attack scenarios.
Security Meaningful If Brought In Early Into Projects: Survey
Quick Hits  |  7/20/2016  | 
Dell study says many see security as an obstacle to digital initiatives and bring in too late to make an impact.
Ex-Cardinal Exec Jailed For Hacking Astros
Quick Hits  |  7/20/2016  | 
Christopher Correa gets 46 months for unlawful access of rival’s database and downloading confidential details.
Remote Systems Admin Software Rigged With Lurk Trojan
News  |  7/19/2016  | 
Website of legitimate and popular application used by banks in Russia and nearby nations faced successive compromises.
Deconstructing Connected Cars: A Hack Waiting To Happen
Commentary  |  7/19/2016  | 
Why your automobile’s simple and reliable Controller Area Network will put you at risk in the brave new world of connected and autonomous driving.
Hacker Jailed For Celebrity Swatting, Doxing
Quick Hits  |  7/19/2016  | 
New Yorker Mir Islam given a two-year jail term for online harassment of public figures.
Ubuntu Forums Database Hacked
Quick Hits  |  7/19/2016  | 
Canonical probe reveals user account details of 2 million stolen, passwords safe.
Ransomware Victims Rarely Pay The Full Ransom Price
News  |  7/18/2016  | 
The purveyors of cyber-extortion schemes often willing to negotiate their ransom fees, F-Secure study finds.
Locking Down Windows 10: 6 New Features
Slideshows  |  7/18/2016  | 
The latest version of Windows includes expanded identity and access controls, advanced Bitlocker encryption, and new malware protections.
UK Rail Hit By Four Cyberattacks In One Year
Quick Hits  |  7/18/2016  | 
No disruption to rail network caused, hackers appear to be nation-states, says cybersecurity firm Darktrace.
Crooks Hack Taiwan ATMs With 'Smartphone,' No Bank Card, Steal Millions
Quick Hits  |  7/18/2016  | 
Police say Russian suspects operate ATM machines without bank card, make off with $2.2 million.
Beyond Data: Why CISOs Must Pay Attention To Physical Security
Commentary  |  7/18/2016  | 
Information security professionals are missing the big picture if they think of vulnerabilities and threats only in terms of data protection, password hygiene and encryption.
Staying Cyber Safe At The Olympics
Slideshows  |  7/16/2016  | 
Travel tips and more in hostile environments abroad.
New HIPAA Guidance Tackles Ransomware Epidemic In Healthcare
Quick Hits  |  7/15/2016  | 
HHS addresses ransomware infections in wake of healthcare attacks.
Meet The Teams In DARPA's All-Machine Hacking Tournament
Slideshows  |  7/15/2016  | 
"Autonomous security" is DARPA's latest game. Its Cyber Grand Challenge will culminate at DEF CON with a contest to see which of these seven finalists' machines will automatically detect and remediate the most security vulnerabilities.
Microsoft Wins Landmark Case Of Overseas Email Handover
Quick Hits  |  7/15/2016  | 
US court overturns 2014 ruling favoring Department of Justice's right to seek data stored overseas.
Chinese Hacker Gets US Prison Term For Military Data Theft
Quick Hits  |  7/15/2016  | 
Su Bin worked alongside Chinese military officers to steal sensitive data from major US defense contractors.
What SMBs Need To Know About Security But Are Afraid To Ask
Slideshows  |  7/14/2016  | 
A comprehensive set of new payment protection resources from the PCI Security Standards Council aims to help small- and medium-sized businesses make security a priority.
Sandia Labs Researchers Build DNA-Based Encrypted Storage
News  |  7/14/2016  | 
Researchers at Sandia National Laboratories in New Mexico are experimenting with encrypted DNA storage for archival applications.
What's Next For Canada’s Surveillance Landscape?
Commentary  |  7/14/2016  | 
Edward Snowden headlines SecTor security conference as Canadian privacy advocates await the Trudeau government’s next move in the country’s complex privacy and security debate.
72% of Black Hat Attendees Expect To Be Hit By 'Major' Data Breach Within A Year
Commentary  |  7/14/2016  | 
End users are the biggest weakness, and we're not doing enough to address the problem.
1 In 3 Consumers Worldwide Hit By Payment Card Fraud
Quick Hits  |  7/14/2016  | 
Card scam cases on the rise globally reportedly due to an increase in smartphone and tablet usage, study finds.
FDIC Likely Hacked By China But Covered Up Breach, Report Says
Quick Hits  |  7/14/2016  | 
A 2013 FDIC internal memo indicates a cover-up of China breach by employees to protect chairman’s job.
Context-Rich And Context-Aware Cybersecurity
Partner Perspectives  |  7/14/2016  | 
An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats.
Purple Teaming: Red & Blue Living Together, Mass Hysteria
News  |  7/13/2016  | 
When you set focused objectives for the red team, you get your blue team to work the weak muscles they need trained most.
AirbnBreach: How Networks At Short-Term Rentals Are Wide Open To Attack
News  |  7/13/2016  | 
New age of community lodging opens the door for old-school network hacks, putting hosts and guests at risk of cyberattacks and stolen personal information.
Adobe Fixes 52 Vulnerabilities In Flash
Quick Hits  |  7/13/2016  | 
Updated version fixes CVEs that allowed remote code execution on affected machines.
Fiat Chrysler Launches Bug Bounty Program
Quick Hits  |  7/13/2016  | 
Platform will be leveraged to identify and resolve security issues in automobile software.
What I Expect to See At Black Hat 2016: 5 Themes
Commentary  |  7/13/2016  | 
Over the years, Black Hat has morphed from a little show for security researchers to a big conference that attracts everyone from black-hat hackers to C-level security execs. Here’s what piques my interest this year.
Healthcare Hacks Face Critical Condition
News  |  7/12/2016  | 
It's not just SSNs and credit cards -- detailed patient records and full EHR databases are targeted by cybercriminals today.
ICS Mess: US Industrial Systems The Most Exposed
News  |  7/12/2016  | 
New data shows vulnerable ICS equipment even as vendors are improving security.
EU’s General Data Protection Regulation Is Law: Now What?
Commentary  |  7/12/2016  | 
Organizations have two years to prepare to act as borrowers, not owners, of customer data. Here are seven provisions of the new GPDR you ignore at your peril.
Covert Voice Commands Can Hack A Smartphone
News  |  7/12/2016  | 
Researchers from Georgetown University and the University of California, Berkeley say cybercriminals could use hidden voice commands via popular YouTube videos to infect Androids and iPhones with malware.
SWIFT Boosts Defense Against Cyberattacks
Quick Hits  |  7/12/2016  | 
Cyber security firms hired, intelligence team set up to ward off future attacks on banks through SWIFT.
Omni Hotels Discloses Payment Card Breach
Quick Hits  |  7/12/2016  | 
Certain properties infected by point-of-sale malware that stole guests' card details.
Profiles Of The Top 7 Bug Hunters From Around the Globe
Slideshows  |  7/12/2016  | 
'Super hunters' share a common goal: to find the most high impact valid bugs before a bad guy does.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.