News & Commentary
Latest Content
Page 1 / 2   >   >>
Data Privacy Etiquette: It's Not Just For Kids
Commentary  |  9/17/2014  | 
Children are the innocent victims of the worst effects of social media. That’s why it’s vital for adults to establish privacy values that are safe for them -- and the rest of us.
Meet The Next Next-Gen Firewall
News  |  9/16/2014  | 
Or at least the latest iteration of one of the oldest-running security tools that continues to evolve and transform with the times.
Browser Vulnerability 'Privacy Disaster' For 3 Of 4 Android Users
Quick Hits  |  9/16/2014  | 
An exploit of an unsupported Android browser bypasses the ever-important Same Origin Policy.
New CVE Naming Convention Could Break Vulnerability Management
News  |  9/16/2014  | 
MITRE sets deadline for releasing new CVEs with different ID format syntax, regardless of how many vulnerabilities we see in 2014.
DR Radio: A Grown-Up Conversation About Passwords
Commentary  |  9/16/2014  | 
Cormac Herley of Microsoft Research will challenge everything you think you know about password management.
In Defense Of Passwords
Commentary  |  9/16/2014  | 
Long live the password (as long as you use it correctly along with something else).
Worm Illuminates Potential NAS Nightmare
News  |  9/15/2014  | 
A researcher at Black Hat Europe hopes to demonstrate a homegrown, self-replicating worm to illustrate major threats to popular network-attached storage systems.
Internet Of Things Devices Are Doomed
News  |  9/15/2014  | 
Security researchers hack Canon printer firmware to run the classic 90s video game Doom as well as to wreak havoc with other manipulations.
5 Myths: Why We Are All Data Security Risks
Commentary  |  9/15/2014  | 
I am absolutely sure that I could be tricked by a well-crafted spear phishing attack, and I am equally sure I could do the same to you.
Security Ops Confidence Levels Drop
News  |  9/12/2014  | 
Survey shows most organizations unable to keep up with new and emerging threats from state-sponsored attackers.
Why Email Is Worth Saving
Commentary  |  9/12/2014  | 
What if an Internet-scale, federated policy, authentication, and enforcement framework for trusted email delivery were available? It is.
Veracode Secures $40M In Funding As IPO Looms
News  |  9/12/2014  | 
Security firm plans to increase investments in sales, marketing, and research and development.
Franchising The Chinese APT
News  |  9/11/2014  | 
At least two different cyber espionage gangs in China appear to be employing uniform tools and techniques, FireEye finds.
Home Depot Breach May Not Be Related To BlackPOS, Target
News  |  9/11/2014  | 
New analysis of the malware earlier identified as a BlackPOS variant leads some researchers to believe that they are two different malware families entirely.
Apple Pay: A Necessary Push To Transform Consumer Payments
Commentary  |  9/11/2014  | 
Apple Pay is a strategic move that will rival PayPal and other contenders in the mobile wallet marketplace. The big question is whether consumers and businesses are ready to ditch the plastic.
Privacy, Security & The Geography Of Data Protection
Commentary  |  9/11/2014  | 
Data generation is global, so why do different parts of the world react differently to the same threat of security breaches and backdoors?
Startup Uncovers Flaws In Mobile Apps, Launches New Security Service
Quick Hits  |  9/11/2014  | 
Wandera says only one of seven US employees is given any guidance on mobile security by the employer.
Google: No Breach In Latest Online Dump Of Credentials
Quick Hits  |  9/11/2014  | 
The online leak of some 5 million username and password combinations consisted of mostly stale or older credentials that don't actually work, Google says.
Apple Pay Ups Payment Security But PoS Threats Remain
News  |  9/10/2014  | 
Apple's new contactless payment tech will not stop point-of-sale breaches like Home Depot and UPS, but it could make those breaches less valuable to attackers.
Security Growing Pangs Loom For 100K+ Sites With Newly Untrusted Certificates
News  |  9/10/2014  | 
Mozilla revokes 1024-bit root certificates in bid to improve Firefox security and similar changes to come for Chrome as Google plans to dump SHA-1 certificates.
Attack Steals Online Banking Credentials From SMBs
News  |  9/10/2014  | 
The "Peter Pan" phish employs Dridex malware, experts say.
InfoSec Book Club: What’s On Your Fall Reading List?
Slideshows  |  9/9/2014  | 
Dark Reading community members share the books that inform and inspire their decisions and interactions as security professionals.
Study: 15 Million Devices Infected With Mobile Malware
Quick Hits  |  9/9/2014  | 
Sixty percent of the infected devices run Android.
Salesforce Passwords At Risk From Dyre
News  |  9/9/2014  | 
Bank credential-stealing malware evolves into targeting SaaS users.
Black Hat & DEF CON: 3 Lessons From A Newbie
Commentary  |  9/9/2014  | 
Security conferences are a lot like metal concerts: Your parents are terrified you're going to die because everyone looks scary, but 98 percent of attendees are really nice people who want to help you learn.
Dark Reading Radio: CISO James Christiansen Shares Experiences
Commentary  |  9/9/2014  | 
Former CISO at GM, Visa, and Experian answers questions about building security programs in large enterprises.
Mobile, Cloud, Partners: Where’s The Weak Link?
Infographics  |  9/9/2014  | 
Your perimeter now incorporates mobile devices, cloud services, and partner networks, so it should be clear that the “moat” method no longer cuts it.
'Kyle & Stan' Parks Malvertising On Amazon, YouTube
Quick Hits  |  9/8/2014  | 
Windows and Macs alike are at risk to sophisticated mutating malware.
UPDATE: Home Depot Confirms Breach; BlackPOS Implicated
Quick Hits  |  9/8/2014  | 
Home Depot confirms there was indeed a breach. Presence of BlackPOS hints that the perpetrators could be the same ones who breached Target.
No End In Sight For Ransomware
Commentary  |  9/8/2014  | 
The screenlocker Kovter, in particular, has shown sharp growth this year. It masquerades as a law enforcement authority and threatens police action if users don’t pay up.
Poll: Significant Insecurity About Internet of Things
Commentary  |  9/5/2014  | 
Fewer than one percent of more than 800 Dark Reading community members are ready for the fast approaching security onslaught of the IoT.
Attacker Infects Healthcare.gov Test Server
News  |  9/5/2014  | 
Federal officials say no consumer data was impacted and second open enrollment period on HealthCare.gov will not be affected.
4 Hurdles To Securing The Internet Of Things
News  |  9/4/2014  | 
Why locking down even the tiniest embedded device is a tall order.
BackOff Not To Blame For GoodWill Breach
News  |  9/4/2014  | 
Rawpos, a "very low risk" infostealer, is responsible for the compromise of roughly 868,000 credit cards.
In Cloud We Trust: A New Model
Commentary  |  9/4/2014  | 
The solution to the problem of data security in the public cloud will require more than a traditional compliance-driven approach.
Home Depot, Other Retailers Get Social Engineered
News  |  9/3/2014  | 
Famed annual contest reveals how many retailers lack sufficient defenses against social engineering.
In China, Cybercrime Underground Activity Doubled In 2013
News  |  9/3/2014  | 
Forget intelligence gathering. Financially motivated cybercrime is booming behind the Great Wall.
Celeb Hack: Is Apple Telling All It Knows?
Commentary  |  9/3/2014  | 
Did Apple have a system-wide data breach? No. Was it complicit through an appalling security lapse by not defending against brute force attacks? You’re darn tootin'!
Apple Not Hacked In Celebrity Nude Photo Breaches
News  |  9/2/2014  | 
"Very targeted attack" on celebrities' Apple usernames, passwords, security questions -- iCloud, Find My iPhone not breached, Apple says.
Home Depot The Latest Hack Victim?
Quick Hits  |  9/2/2014  | 
Home improvement chain--along with law enforcement and banks--are investigating 'unusual activity.'
“Contactless” HCE Payments Promise Simplicity But Is It Secure?
Commentary  |  9/2/2014  | 
Host Card Emulation is a powerful and flexible technology, but like most software-dependent solutions, it can be hacked and exploited.
How To Create A Risk 'Pain Chart'
News  |  8/29/2014  | 
Consultant John Pironti outlines how to execute a risk-based approach to defending corporate assets.
Why Are Security Pros Blasé About Compliance?
Commentary  |  8/29/2014  | 
A survey of 500 IT and security decision makers in the UK and US shows that a majority are in the dark about regulatory requirements for their business organization.
CryptoWall More Pervasive, Less Profitable Than CryptoLocker
News  |  8/28/2014  | 
The former CryptoLocker wannabe has netted 625,000 infected systems and more than $1 million in ransoms.
Feds Investigating Breaches At JPMorgan, Other Banks
News  |  8/28/2014  | 
JPMorgan working with FBI, US Secret Service to determine scope of breach, but other newly reported intrusions at financial firms may not be related.
Backoff, Dairy Queen, UPS & Retail's Growing PoS Security Problem
News  |  8/27/2014  | 
Retail brands are trying to pass the buck for data security to banks and franchisees, say some experts.
10 Common Software Security Design Flaws
News  |  8/27/2014  | 
Google, Twitter, and others identify the most common software design mistakes -- compiled from their own organizations -- that lead to security woes and how to avoid them.
How I Hacked My Home, IoT Style
Commentary  |  8/27/2014  | 
It didn’t take long to find a score of vulnerabilities in my home entertainment, gaming, and network storage systems.
Online Tools For Bug Disclosure Abound
News  |  8/26/2014  | 
What's driving the bounty of software vulnerability disclosure offerings today from Bugcrowd, HackerOne, and Synack.
Sony, XBox Victims Of DDoS, Hacktivist Threats
Quick Hits  |  8/26/2014  | 
Hacktivists from Anonymous and from a presumed Islamic extremist group targeted a variety of online gaming services.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1032
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in the Euroling SiteSeeker module 3.x before 3.4.5 for EPiServer allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party inf...

CVE-2012-1417
Published: 2014-09-17
Multiple cross-site scripting (XSS) vulnerabilities in Local Phone book and Blacklist form in Yealink VOIP Phones allow remote authenticated users to inject arbitrary web script or HTML via the user field to cgi-bin/ConfigManApp.com.

CVE-2012-1506
Published: 2014-09-17
SQL injection vulnerability in the updateStatus function in lib/models/benefits/Hsp.php in OrangeHRM before 2.7 allows remote authenticated users to execute arbitrary SQL commands via the hspSummaryId parameter to plugins/ajaxCalls/haltResumeHsp.php. NOTE: some of these details are obtained from th...

CVE-2012-1507
Published: 2014-09-17
Multiple cross-site scripting (XSS) vulnerabilities in OrangeHRM before 2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) newHspStatus parameter to plugins/ajaxCalls/haltResumeHsp.php, (2) sortOrder1 parameter to templates/hrfunct/emppop.php, or (3) uri parameter to index...

CVE-2012-2583
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Mini Mail Dashboard Widget plugin 1.42 for WordPress allows remote attackers to inject arbitrary web script or HTML via the body of an email.

Best of the Web
Dark Reading Radio