News & Commentary
Latest Content
Page 1 / 2   >   >>
Dangers Of Shopping Are Evolving
Quick Hits  |  11/26/2014  | 
Point-of-sale malware is making brick-and-mortar shopping more dangerous. Online, attackers are beginning to value user accounts with payment information attached more than credit card details themselves.
Custom Malware Sneaks Past Advanced Threat Detection Appliances In Lab Experiment
News  |  11/26/2014  | 
An independent test of advanced threat detection products demonstrates how they could be bypassed by attackers.
10 Ways Security Gurus Give Thanks
News  |  11/25/2014  | 
From board-level awareness to bug bounty programs and everything in between, the security world's maturation offers security practitioners something to be thankful for.
6 Million+ Email Accounts Worldwide Exposed In Past 3 Months
Quick Hits  |  11/25/2014  | 
Spike in number of stolen accounts likely due to uptick in major data breaches, researchers say.
Data Management Vs. Data Loss Prevention: Vive La Différence!
Commentary  |  11/25/2014  | 
A sensitive data management strategy can include the use of DLP technology, but it also involves a comprehensive understanding of where your data is and what specifically is at risk.
Underground Carders Abusing Charities To Verify Stolen Payment Data
News  |  11/25/2014  | 
Charities' weak fraud controls make things easier on donors and criminals alike.
Newly Revealed Cyber Espionage Attack 'More Complex' Than Stuxnet, Flame
News  |  11/24/2014  | 
"Regin" cyber spying platform is reportedly behind cyber spying against a Belgian telecommunications provider, which was revealed in leaked NSA documents.
How I Became A CISO: Mark Potter, Danya International
News  |  11/24/2014  | 
Much like one of his favorite choose-your-own-adventure novels, Mark Potter's path to the chief information security officer job was full of twists, turns, and a couple of falls off a cliff.
Don't Discount XSS Vulnerabilities
News  |  11/24/2014  | 
XSS flaws are more serious than you'd think.
Cyber Security Needs Its Ralph Nader
Commentary  |  11/24/2014  | 
It took thousands of unnecessary traffic fatalities to create an environment for radical transformation of the auto industry. What will it take for a similar change to occur in data security?
Privacy Groups Release 'Detekt' Tool to Spot Spyware
News  |  11/21/2014  | 
Privacy advocates have joined together to release a tool for identifying cyber espionage malware.
Cloud Security By The Numbers
Slideshows  |  11/21/2014  | 
Quantifying the perceptions around cloud security practices.
The Week When Attackers Started Winning The War On Trust
Commentary  |  11/21/2014  | 
The misuse of keys and certificates is not exotic or hypothetical. It’s a real threat that could undermine most, if not all, critical security controls, as recent headlines strongly show.
When Every Minute Counts (Part 2)
Partner Perspectives  |  11/21/2014  | 
Acting on key Indicators of Attack for incident response is crucial.
Russian Cyber Espionage Under The Microscope
News  |  11/20/2014  | 
New report shows level of coordination and strategy by three main groups of cyberspies out of Russia.
New Citadel Attack Targets Password Managers
News  |  11/20/2014  | 
IBM researchers have found signs that the prolific data steal Trojan is now being used to attack widely used password managers.
You’re Doing BYOD Wrong: These Numbers Prove It
Partner Perspectives  |  11/20/2014  | 
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place.
Surveillance Cameras Next On The Insecure IoT List
News  |  11/20/2014  | 
Three buffer overflow vulnerabilities leave HikVision video recorders open to remote code execution.
Enter The Digital Risk Officer
Commentary  |  11/20/2014  | 
In the brave new world of digital risk management, a CISO would report up to a DRO who manages risk from a business perspective and works with peers in business ops, compliance, and IT security.
When Every Minute Counts: Fighting Advanced Threats With Real-Time SIEM
Partner Perspectives  |  11/19/2014  | 
Survey shows that reducing time-to-detection is possible with the right approach.
Internet Architecture Board Calls For Net Encryption By Default
News  |  11/19/2014  | 
The Internet Architecture Board (IAB) urges encryption across the protocol stack to usher in an era where encrypted traffic is the norm. But there are possible security tradeoffs.
New Certification Authority To Offer Free Certs For HTTPS
News  |  11/19/2014  | 
The Electronic Frontier Foundation's new certificate authority aims to make getting a domain validation TLS cert so easy, you can't resist.
Machine Learning: A Solution to Today's Security Threats & One Step Closer to AI
Partner Perspectives  |  11/19/2014  | 
Algorithms can identify threats that have been missed by traditional security mechanisms.
Killing Passwords: Don’t Get A-Twitter Over ‘Digits’
Commentary  |  11/19/2014  | 
Twitter’s new service that eliminates passwords for authentication actually makes your mobile device less secure.
The Rise Of The Resilient Mobile Botnet
News  |  11/19/2014  | 
New report on what researchers call one of the 'most sophisticated mobile botnets online' shows how profitable mobile malware has become.
Microsoft Issues Emergency Patch Amid Targeted Attacks
News  |  11/18/2014  | 
Windows Kerberos authentication bug "critical."
'Misdial Trap' Phone Scam Hits Financial Services
Quick Hits  |  11/18/2014  | 
One in six financial institutions victimized by this new scam.
Best Practices in the Face of High-Profile Breaches
Partner Perspectives  |  11/18/2014  | 
Attacks are a mainstream problem, and organizations must employ more than just traditional minimalist approaches of firewalls and virus scanners.
State Dept. Breach Heightens Concerns Over Resilience Of Government Networks
News  |  11/18/2014  | 
The department is the fourth federal entity in recent weeks to disclose a data breach.
Is Security Awareness Training Really Worth It?
News  |  11/18/2014  | 
Experts weigh in on the value of end-user security training, and how to make education more effective.
Deconstructing the Cyber Kill Chain
Commentary  |  11/18/2014  | 
As sexy as it is, the Cyber Kill Chain model can actually be detrimental to network security because it reinforces old-school, perimeter-focused, malware-prevention thinking.
The Year Of The Retailer Data Breach
Slideshows  |  11/17/2014  | 
This year's wave of attacks was more dramatic in its widespread scope and seemingly constant battering of more than a dozen big box chains.
Is Rogue IT Really A Problem?
News  |  11/17/2014  | 
Rogue IT may be a misnomer for the subtleties of IT security's involvement in cloud procurement.
Why Cyber Security Starts At Home
Commentary  |  11/17/2014  | 
Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens anywhere on the Internet can eventually affect us all.
'Bashlite' Malware Leverages ShellShock In BusyBox Attack
News  |  11/14/2014  | 
A new version of Bashlite aims to get control of devices running on BusyBox, such as routers.
Microsoft Fixes Critical SChannel & OLE Bugs, But No Patches For XP
News  |  11/14/2014  | 
No patches released for the now-unsupported XP even though the 19-year-old OLE bug is critical and "Winshock" bug in Windows' SSL/TLS installation could be worse than Heartbleed.
Rethinking Security With A System Of 'Checks & Balances'
Commentary  |  11/14/2014  | 
For too long, enterprises have given power to one branch of security governance -- prevention -- at the expense of the other two: detection and response.
NOAA Blames China In Hack, Breaks Disclosure Rules
News  |  11/13/2014  | 
The National Oceanic and Atmospheric Administration finally confirms that four websites were attacked and taken down in September, but details are sketchy and officials want answers.
Time To Turn The Tables On Attackers
Commentary  |  11/13/2014  | 
As a security industry, we need to arm business with innovative technologies that provide visibility, analysis, and action to prevent inevitable breaches from causing irreparable damage.
Retail Hacking: What To Expect This Holiday Season
Commentary  |  11/13/2014  | 
Find out what retailers are doing (and not doing) to keep customers and transactions safe on Dark Reading Radio with guests with Nick Pelletier of Mandiant, and Arthur Tisi, CIO, Natural Markets Food Group.
The Enemy Who Is Us: DoD Puts Contractors On Notice For Insider Threats
Commentary  |  11/13/2014  | 
New rule requires US government contractors to gather and report information on insider threat activity on classified networks.
Expired Antivirus Software No. 1 Cause Of Unprotected Windows 8 PCs
News  |  11/13/2014  | 
New data from Microsoft shows that nearly 10% of Windows 8 users are running expired AV software on their systems, making them four times more likely to get infected.
What We Mean by Maturity Models for Security
Partner Perspectives  |  11/12/2014  | 
The aim is to assess the current state of security against a backdrop of maturity and capability to translate actions into goals that even non-security people can grasp.
Better Together: Why Cyber Security Vendors Are Teaming Up
Commentary  |  11/12/2014  | 
Alliances, mergers, and acquisitions are ushering in an era of unprecedented “co-opetition” among former rivals for your point solution business.
POS Malware Continues To Evolve
News  |  11/11/2014  | 
New report out today details three prevalent families.
Stuxnet 'Patient Zero' Attack Targets Revealed
News  |  11/11/2014  | 
Researchers name five Iranian industrial control systems companies attacked in 2009-2010, and they question whether USB sticks were really the method of infection.
Small-to-Midsized Businesses Targeted In More Invasive Cyberattacks
News  |  11/11/2014  | 
How notorious remote access tools Predator Pain and Limitless have evolved into bargain-basement tools accessible to masses of cybercriminals.
US Postal Service Suspends Telecommuting Following Massive Data Breach
News  |  11/11/2014  | 
Employee VPN taken down -- will not be restored until more secure version can be installed, Postal Service says after breach exposes data on 800,000 employees and 2.9 million customers.
How Enterprises Can Get The Most From Threat Intelligence
News  |  11/11/2014  | 
Understanding the threats faced by your organization can improve your defenses. Here are some tips for choosing tools and services -- and maximizing their impact.
‘Walk & Stalk’: A New Twist In Cyberstalking
Commentary  |  11/11/2014  | 
How hackers can turn Wifi signals from smartphones and tablets into a homing beacon that captures users' online credentials and follows them, undetected, throughout the course of the day.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5426
Published: 2014-11-27
MatrikonOPC OPC Server for DNP3 1.2.3 and earlier allows remote attackers to cause a denial of service (unhandled exception and DNP3 process crash) via a crafted message.

CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?