News & Commentary
Latest Content
Page 1 / 2   >   >>
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Dark Reading Videos  |  9/30/2016  | 
Rick Holland of Digital Shadows explains how the attackers' superior business agility, faster change management, specialized job force, lower barriers to entry and bulletproof hosting keeps them ahead of the good guys.
6 Ways To Prepare For The EUs GDPR
News  |  9/30/2016  | 
In less than 20 months, all US companies doing business in the EU will face new consumer privacy requirements. Heres how to prepare for them.
Today's Cybersecurity Management Requires A New Approach
Commentary  |  9/30/2016  | 
The current managed security services provider model just doesn't work in our information-rich world. Time to shake things up.
Cybercrime-as-a-Service Offered To Militants, Terrorists, Says Europol
Quick Hits  |  9/30/2016  | 
The Darknet could provide ample resources and services for terrorists to carry out attacks, claims report.
Romanian National Gets Three Years For Hack Scheme
Quick Hits  |  9/30/2016  | 
Mircea-Ilie Ispasoiu was arrested for international hacking plot that involved wire fraud and aggravated identity theft.
10 Hottest Sessions At Black Hat Europe 2016
Slideshows  |  9/30/2016  | 
A sneak-peek at some of the more intriguing Briefings at the upcoming conference in London.
EMV: The Anniversary Of One Deadline, The Eve of Another
News  |  9/29/2016  | 
How merchants and criminals responded since the EMV liability shift for point-of-sale devices one year ago. And what changes can we expect after the liability shift for ATMs, which is just days away?
How A Pair Of Cybercriminals Scales Its Carder Business
News  |  9/29/2016  | 
'Vendetta Brothers' cybercrime duo runs site that offers cards stolen from over 600 banks in 41 countries, FireEye says.
Researchers Shoot Down Yahoo Claim Of Nation-State Hack
News  |  9/29/2016  | 
InfoArmor says the attackers who stole a half-billion Yahoo user accounts were seasoned cybercriminals who later sold the booty to an Eastern European nation-state.
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
News  |  9/29/2016  | 
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.
Fear & Loathing In The Cloud
Commentary  |  9/29/2016  | 
Whether you've already bought your ticket for the cloud or still have some issues to sort through, fine-tune your security practices to make sure your ride is a smooth one.
A Bug Bounty Reality-Check
News  |  9/29/2016  | 
New study shows that bug bounties without a secure application development program and testing can be costly.
Microsoft Launches Cloud-Based Fuzzing
News  |  9/28/2016  | 
'Project Springfield' debuts at Ignite conference.
Russian Hackers Target Citizen Journalists Reporting On Malaysian Airlines Crash
News  |  9/28/2016  | 
Bellingcats reporters have been hit with spear phishing attacks and account takeover attempts for over a year, ThreatConnect says.
The Real Reasons Why Users Stink At Passwords
News  |  9/28/2016  | 
Personality, denial, and authentication-overload are big factors, new study finds.
Hacking The Polls: Where US Voting Processes Fall Short
Commentary  |  9/28/2016  | 
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.
More Than Half Of IT Pros Employ Insecure Data Wiping Methods
News  |  9/28/2016  | 
Recent study shows most enterprise IT professionals incorrectly believe emptying a Recycle Bin or reformatting a computer drive permanently erases data.
Improving Security Savvy Of Execs And Board Room
Improving Security Savvy Of Execs And Board Room
Dark Reading Videos  |  9/28/2016  | 
Jeff Welgan describes how best to improve cybersecurity literacy throughout the C-suite.
SWIFT Toughens Customer Security With New Mandatory Rules
Quick Hits  |  9/28/2016  | 
Measures to include set of core safety standards and assurance framework requiring annual self-attestation by SWIFT members.
Beep Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
Partner Perspectives  |  9/28/2016  | 
The practice of security economics demonstrates how gaps in the security architecture impair business results.
FBI Probes Bid To Hack Democratic Party Officials Phones, Sources Say
Quick Hits  |  9/28/2016  | 
Russia-backed criminals again likely to be behind this hacking which, if proven, could involve theft of sensitive data, say the sources.
Improving The Security Conversation For CIOs, CISOs, & Board Members
News  |  9/28/2016  | 
Cybersecurity is a top priority among enterprise leaders, but it's difficult for them to communicate with IT and security teams if they lack an understanding of key security concepts.
Clinton, Trump Debate 'Twenty-First Century War' Of Cyberattacks
News  |  9/27/2016  | 
Lester Holt led with topic of cybersecurity as the first question on national security in Monday's Presidential debate.
5 Best Practices For Winning the IoT Security Arms Race
Commentary  |  9/27/2016  | 
By focusing on a pragmatic approach to security, its possible to develop IoT solutions that will reduce future risk without breaking the bank.
25 Security Vendors To Watch
Slideshows  |  9/27/2016  | 
A wave of security companies are armed with technologies to help businesses mitigate the next generation of cyberattacks. Who are these vendors and what can they offer?
Yahoo Confirms August Data Dump Issue Unrelated To Breach Of 500 Million Users
Quick Hits  |  9/27/2016  | 
No 'connection' between August 2016 data dump claims and 2014 nation-state attack, company says.
Sharing Cybersecurity Threat Intelligence Is The Only Way We Win
Partner Perspectives  |  9/27/2016  | 
Security organizations must leverage each others information in order to better predict, prevent, detect, and respond to threats their customers and organizations face.
Yahoo Sued By User Over 2014 Hacking
Quick Hits  |  9/27/2016  | 
New Yorker files lawsuit against Yahoo for recklessness and delay in uncovering hack of half a billion accounts.
Yahoo Breach: US Senator Seeks SEC Role In Probe
Quick Hits  |  9/27/2016  | 
Democrat Mark Warner asks US Securities and Exchange Commission to investigate whether Yahoo completed obligations post breach discovery.
Mobile Fraud Changes Outlook for Multifactor Authentication
Commentary  |  9/27/2016  | 
SMS one-time passcodes just won't cut it anymore. We need new approaches that people will actually use.
Russian 'Fancy Bear' Hackers Hit Mac OS X With New Trojan
News  |  9/26/2016  | 
Aerospace victim hit by targeted attack that didn't even exploit a Mac vulnerability.
Ransomware: Coming To A Hospital Near You?
Partner Perspectives  |  9/26/2016  | 
10 ways to protect healthcare systems from ransomware and other malware infections.
Cyber Risk Among Top Concerns For Business Leaders: Study
News  |  9/26/2016  | 
More than 50% of business leaders surveyed in the Travelers Risk Index report cyber, computer, and technology risks are among their top concerns.
FBI Probes Dumping Of NSA Hack Tools On Public Site
Quick Hits  |  9/26/2016  | 
National Security Agency says tools left exposed by mistake - and dumping by presumably Russia-backed hackers Shadow Brokers.
Yahoo Breach Could Delay $4.8 Billion Verizon Takeover
Quick Hits  |  9/26/2016  | 
Verizon may revisit contract with Yahoo on doubts of vulnerabilities in the system after 500 million accounts were found hacked.
What The WADA Hack Proves About Today's Threat Landscape
Commentary  |  9/26/2016  | 
Fancy Bear's initial release of data on four top American athletes reminds us all to reassess our risks.
Microsoft Launches Windows Defender App Guard For Its Edge Browser
News  |  9/26/2016  | 
Microsoft debuts a new tool to strengthen security in its Edge browser for Windows Enterprise customers.
Adware Campaign Using Advanced Nation-State Obfuscation Techniques
News  |  9/26/2016  | 
New report from Carbon Black shows adware may be spreading ransomware, using similar tactics as Operation Aurora.
State Of The Exploit Kit
Slideshows  |  9/26/2016  | 
Exploit kit traffic is down considerably following the demise of Nuclear and Angler, but many researchers see it only as a temporary disruption.
7 New Rules For IoT Safety & Vuln Disclosure
Commentary  |  9/24/2016  | 
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!
Advisory Body Calls For Stronger Cybersecurity Measures Across Airline Industry
News  |  9/23/2016  | 
Measures are designed to bolster operational security across all stakeholders in the aviation sector, Wall Street Journal says.
Spam Levels Spike, Thanks In Part To Ransomware
News  |  9/23/2016  | 
By shipping banking Trojans and ransomware that turn big profits fast, spammers can now afford the high overhead of high-volume spam campaigns.
7 Ways Cloud Alters The Security Equation
Slideshows  |  9/23/2016  | 
Would-be and existing customers must understand that security isn't set-and-forget just because it resides in the cloud.
An Open-Source Security Maturity Model
An Open-Source Security Maturity Model
Dark Reading Videos  |  9/23/2016  | 
Oh you don't run open-source code? Really? Christine Gadsby and Jake Kouns explain how to identify and secure all those open-source libraries and other third-party components lurking inside your applications, proprietary and otherwise.
D-FENSE! Using Research To Craft Effective Cyber Defenses
D-FENSE! Using Research To Craft Effective Cyber Defenses
Dark Reading Videos  |  9/23/2016  | 
A pair of experts from Imperva stops by the Dark Reading News Desk to chat.
On-Premises & In The Cloud: Making Sense Of Your Cybersecurity Ecosystem
Commentary  |  9/23/2016  | 
As enterprises continue to invest in hybrid cloud strategies, they need their fragmented security solutions to work together.
FTC Releases Video With Data Breach Recovery Advice
Quick Hits  |  9/23/2016  | 
The US Federal Trade Commission video has detailed instructions on what to do if personal data of a user is stolen and exposed.
Top Democrats Tell Putin To Halt Hacking Of US Political Parties
Quick Hits  |  9/23/2016  | 
Russia trying to influence November presidential elections, say Senator Dianne Feinstein and Rep. Adam Schiff.
Biometric Skimmers Pose Emerging Threat To ATMs
News  |  9/22/2016  | 
Even as financial institutions move to shore up ATM security with biometric mechanisms, cybercrooks are busy figuring out ways to beat them.
Yahoo Reveals Nation State-Borne Data Breach Affecting A Half-Billion Users
News  |  9/22/2016  | 
But still unconfirmed is whether the newly revealed attack is related to recently dumped Yahoo user credentials in an online cybercrime forum.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.