News & Commentary
Latest Content
Page 1 / 2   >   >>
Cloudflare Leaked Web Customer Data For Months
News  |  2/24/2017  | 
Potential scope of issue evokes comparisons to Heartbleed.
20 Cybersecurity Startups To Watch In 2017
Slideshows  |  2/24/2017  | 
VC money flowed plentifully into the security market last year, fueling a new crop of innovative companies.
IaaS: The Next Chapter In Cloud Security
Commentary  |  2/24/2017  | 
Organizations adopting IaaS must update their approach to security by using the shared responsibility model.
Suspect Arrested In Connection With Mirai Botnet
Quick Hits  |  2/24/2017  | 
One million Deutsche Telekom customers were knocked offline in a November 2016 cyberattack.
Florida Man Pleads Guilty To Clinton Foundation Hack Attempts
Quick Hits  |  2/24/2017  | 
Timothy Sedlak also convicted in child pornography case and sentenced to 42 years in jail, Reuters reports.
Russia Top Source Of Nefarious Internet Traffic
News  |  2/23/2017  | 
Honeypot research from F-Secure shows majority of illicit online activity coming from IP addresses in Russia - also where ransomware is a hot commodity.
Survey: Most Attackers Need Less Than 12 Hours To Break In
News  |  2/23/2017  | 
A Nuix study of DEFCON pen testers shows that the usual security controls are of little use against a determined intruder
Blockchains New Role In The Internet of Things
Commentary  |  2/23/2017  | 
With next gen distributed consensus algorithms that combine both security and performance, organizations can defend against DDoS attacks, even those that leverage IoT devices
Google Researchers 'Shatter' SHA-1 Hash
Quick Hits  |  2/23/2017  | 
'Collision' attack by researchers at CWI Institute and Google underscores need to retire SHA-1.
Netflix Debuts 'Stethoscope' Open-Source Security Tool
Quick Hits  |  2/23/2017  | 
Entertainment giant offers open-source app for security.
Road Map To A $200,000 Cybersecurity Job
Commentary  |  2/23/2017  | 
Looking to get ahead in cybersecurity? Here are four areas to keep in mind as you make a five-year career plan.
Microsoft Releases Security Updates For Some, Not All, Flaws
Quick Hits  |  2/23/2017  | 
February 21 release addresses Adobe Flash Player bugs for Internet Explorer on Windows 8.1 and Edge for Windows 10.
Exploit Kit-Based Attacks Decline Dramatically
News  |  2/23/2017  | 
But it's too soon to call this downward trend a permanent shift, experts say.
How to Secure Hyperconverged Infrastructures & Why It Is Different
Partner Perspectives  |  2/23/2017  | 
The next-generation datacenter requires new security practices, but that doesnt mean everything we learned about datacenter security becomes obsolete.
End-Of-Life Software Alive And Well On US PCs
News  |  2/23/2017  | 
7.5% of users ran unpatched Windows operating systems in Q4 of 2016, up from 6.1 percent in Q3 of 2016, new study shows.
Fewer Than One-Fourth Of Cybersecurity Job Candidates Are Qualified
News  |  2/22/2017  | 
ISACA report finds that 55% of security jobs take three- to six months to fill, and under 25% of candidates are qualified for the jobs they apply for.
Tunneling Through The "Walls" Of IoT In The Enterprise
Commentary  |  2/22/2017  | 
The movie "Die Hard" has a thing or two to teach us about the pitfalls of the Internet of Things.
Why We Need To Reinvent How We Catalogue Malware
Commentary  |  2/22/2017  | 
One obvious trend: crimeware technologies that come with simple user consoles and functionality to create unique binaries at the click of a button.
6 Tips for Preventing Laptop Data Theft
News  |  2/22/2017  | 
Experts point to stronger passwords, full-disk encryption, and multi-factor authentication as ways to stop data theft in the event a laptop is lost or stolen.
80% Of Web Applications Contain At Least One Security Bug
Quick Hits  |  2/22/2017  | 
Study by Contrast Security finds an average of 45 vulnerabilities per Web application.
Yahoo Trims Its Price Tag To Verizon By $350 Million
Quick Hits  |  2/22/2017  | 
Announcement of new deal price from the previous $4.8 billion allays fears of deal cancellation or even bigger price cut.
Speak Up: Ransomware Attack Uses Voice Recognition
News  |  2/22/2017  | 
New variant of Android ransomware comes with a bizarre twist.
Survey: 14% Of IT Execs Would Pay $500K To Avoid Shaming After A Breach
Partner Perspectives  |  2/22/2017  | 
Bitdefender report shows how negative media headlines following an attack can cause financial damage, ruin business forecasts and severely damage reputations.
Stolen Health Record Databases Sell For $500,000 In The Deep Web
News  |  2/21/2017  | 
Electronic health record databases proving to be some of the most lucrative stolen data sets in cybercrime underground.
Google Shines Light On Corporate Gmail Threats
Quick Hits  |  2/21/2017  | 
New data highlights the diversity of security threats putting corporate Gmail inboxes at risk.
Social Media Impersonators Drive Security Risk
News  |  2/21/2017  | 
A new pool of research digs into the fraudulent social media accounts, a growing threat to individuals and businesses.
Law Enforcement At RSAC: Collaboration Is Key To Online Crime Fighting
News  |  2/21/2017  | 
Agencies and investigators are reaching out across jurisdictions and international borders to vanquish spammers, botnet operators, and worse.
8 Valuable Security Certifications For 2017
Slideshows  |  2/21/2017  | 
A security credential could be the step towards your next job title. But which one to get?
Preparing Security For Windows 7 End-Of-Life Support
Commentary  |  2/21/2017  | 
Moving to Microsoft's latest OS may give you flashbacks to when XP support ended.
FBI Pursues Three Probes Into Russian Hacking Of US Elections
Quick Hits  |  2/21/2017  | 
Sources say the bureau's offices in Pittsburgh, San Francisco, and Washington are investigating the alleged hack.
Two More Sentenced In $1.3 Million Spam Email Scheme
Quick Hits  |  2/21/2017  | 
Tomasz Chmielarz and Devin McArthur get two years of probation for involvement in a hacking scheme affecting 60M people.
Controlling Privileged Access To Prevent Rogue Users In Active Directory
Commentary  |  2/20/2017  | 
Knowing which of your employees have which privileges is the first step to staying safe.
Voice Biometrics Prone To Error, Study Shows
News  |  2/20/2017  | 
New research shows the need for a holistic solution to authentication, not just voice biometrics alone.
Do Software-Defined Data Centers Pose Security Concerns?
Partner Perspectives  |  2/20/2017  | 
SDDC adoption is likely to trigger widespread data security governance programs, with 20 percent of organizations considering them necessary to prevent data breaches.
At Least 70 Organizations Targeted In Sophisticated Cyber Surveillance Operation
News  |  2/17/2017  | 
Most of the targets are in Ukraine, though a few have been spotted in Russia and elsewhere, CyberX says
Yahoo Explains Cookie Forgery Related To Two 2016 Breaches
Quick Hits  |  2/17/2017  | 
Yahoo's recent update on forged cookies is in relation to two, not three, security breaches announced last year.
Closing The Cybersecurity Skills Gap With STEM
Commentary  |  2/17/2017  | 
As a nation, we should be doing more to promote educational programs that prepare today's students for tomorrow's jobs.
After Election Interference, RSA Conference Speakers Ask What Comes Next
News  |  2/17/2017  | 
Election-tampering called 'a red line we should not allow anyone to cross.'
Man Jailed For Hacking Ex-Employer's Operations
Quick Hits  |  2/17/2017  | 
Louisiana resident Brian Johnson was sentenced to 34 months in prison and ordered to pay more than $1.1 million in damages.
Florida Man Gets 48 Months For $1.3M Spam Email Scheme
Quick Hits  |  2/17/2017  | 
Timothy Livingston committed identity theft and sent bulk spam emails on behalf of clients, generating $1.3 million in profit.
NSS Labs Talks Operationalizing Security
NSS Labs Talks Operationalizing Security
Dark Reading Videos  |  2/17/2017  | 
At RSA, NSS Labs CTO Jason Brvenik discusses how to find the gaps in your current web of security products and how to discover what you're not finding.
Iran Intensifies Its Cyberattack Activity
News  |  2/16/2017  | 
Middle East targets namely Saudi Arabia are feeling the brunt of the attacks, but experts anticipate Iran will double down on hacking US targets.
Ransomware Growth Fueled By Russian-Speaking Cybercriminals
News  |  2/16/2017  | 
Individuals and groups from Russian-speaking countries responsible for a lot of ransomware activity, Kaspersky Lab says.
Recorded Future Talks Threat Intel
Recorded Future Talks Threat Intel
Dark Reading Videos  |  2/16/2017  | 
At the RSA Conference, Recorded Future's vice president of intelligence and strategy Levi Gundert and director of advanced collection Andrei Barysevich discuss threat intelligence.
The Era Of Data-Jacking Is Here. Are You Ready?
Commentary  |  2/16/2017  | 
As data in the cloud becomes more valuable, the cost of weak security will soon be higher than many organizations can bear. Here's why.
Ukraine Blames Russia For New Virus Targeting Infrastructure
Quick Hits  |  2/16/2017  | 
The Russian security service, software firms, and criminal hackers are accused of orchestrating cyberattacks on Ukraine's infrastructure.
Yahoo Warns Users Of Forged Cookies In Third Breach
Quick Hits  |  2/16/2017  | 
The company sent a warning to users about forged cookies used in a third data breach originally reported in December 2016.
MEDJACK.3 Poses Advanced Threat To Hospital Devices
News  |  2/16/2017  | 
A newly discovered version of the "medical device hijack" attack targets older operating systems to bypass security measures and steal patient data.
New Attack Threatens Android For Work Security
News  |  2/16/2017  | 
The enterprise privacy app, designed to separate personal and business information, is open to attacks putting corporate data at risk.
Mimecast Tackles Email-Bound Risks
Mimecast Tackles Email-Bound Risks
Dark Reading Videos  |  2/16/2017  | 
At RSA, Mimecast cyber security strategy Bob Adams discusses graduating from basic filtering to true email security risk assessment.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.