News & Commentary
Latest Content
Page 1 / 2   >   >>
Home Depot Breach Surpasses Target In Scope
News  |  9/19/2014  | 
New details have emerged about the breach affecting Home Depot, which exposed 56 million payment cards in stores in the US and Canada and utilized custom malware.
Mobile Device Security Isn't All About Devices
Mobile Device Security Isn't All About Devices
Dark Reading Videos  |  9/19/2014  | 
Roberto Medrano, executive vice president of SOA Software, explains why securing mobile applications and APIs is so essential.
An AppSec Report Card: Developers Barely Passing
Commentary  |  9/19/2014  | 
A new study reveals that application developers are getting failing grades when it comes to their knowledge of critical security such as how to protect sensitive data, Web services, and threat modeling.
Is Enterprise IT Security Ready For iOS 8?
News  |  9/19/2014  | 
Apple bakes in more security features, but iOS 8 won't come without security ops headaches.
5 Ways To Monitor DNS Traffic For Security Threats
Commentary  |  9/18/2014  | 
Check out these examples of how to implement real-time or offline traffic monitoring using common commercial or open source security products.
Google Backs New Effort To Simplify Security
Quick Hits  |  9/18/2014  | 
New organization Simply Secure aims to promote and shape more user-friendly security and privacy technologies on the Internet.
US Military In The Dark On Cyberattacks Against Contractors
News  |  9/18/2014  | 
A lack of communication between military contractors and government agencies about Chinese cyber espionage attacks is revealed in a new Senate report.
7 Reasons To Love Passwords
Slideshows  |  9/17/2014  | 
Passwords are often ridiculed, but there are some reasons they should be your nearest and dearest authentication factor.
Cyberspies Resuscitate Citadel Trojan For Petrochemical Attacks
News  |  9/17/2014  | 
The Citadel Trojan is a rare and odd choice of malware for cyber espionage purposes, experts say.
Data Privacy Etiquette: It's Not Just For Kids
Commentary  |  9/17/2014  | 
Children are the innocent victims of the worst effects of social media. That’s why it’s vital for adults to establish privacy values that are safe for them -- and the rest of us.
Meet The Next Next-Gen Firewall
News  |  9/16/2014  | 
Or at least the latest iteration of one of the oldest-running security tools that continues to evolve and transform with the times.
Browser Vulnerability 'Privacy Disaster' For 3 Of 4 Android Users
Quick Hits  |  9/16/2014  | 
An exploit of an unsupported Android browser bypasses the ever-important Same Origin Policy.
New CVE Naming Convention Could Break Vulnerability Management
News  |  9/16/2014  | 
MITRE sets deadline for releasing new CVEs with different ID format syntax, regardless of how many vulnerabilities we see in 2014.
DR Radio: A Grown-Up Conversation About Passwords
Commentary  |  9/16/2014  | 
Cormac Herley of Microsoft Research will challenge everything you think you know about password management.
In Defense Of Passwords
Commentary  |  9/16/2014  | 
Long live the password (as long as you use it correctly along with something else).
Worm Illuminates Potential NAS Nightmare
News  |  9/15/2014  | 
A researcher at Black Hat Europe hopes to demonstrate a homegrown, self-replicating worm to illustrate major threats to popular network-attached storage systems.
Internet Of Things Devices Are Doomed
News  |  9/15/2014  | 
Security researchers hack Canon printer firmware to run the classic 90s video game Doom as well as to wreak havoc with other manipulations.
5 Myths: Why We Are All Data Security Risks
Commentary  |  9/15/2014  | 
I am absolutely sure that I could be tricked by a well-crafted spear phishing attack, and I am equally sure I could do the same to you.
Security Ops Confidence Levels Drop
News  |  9/12/2014  | 
Survey shows most organizations unable to keep up with new and emerging threats from state-sponsored attackers.
Why Email Is Worth Saving
Commentary  |  9/12/2014  | 
What if an Internet-scale, federated policy, authentication, and enforcement framework for trusted email delivery were available? It is.
Veracode Secures $40M In Funding As IPO Looms
News  |  9/12/2014  | 
Security firm plans to increase investments in sales, marketing, and research and development.
Franchising The Chinese APT
News  |  9/11/2014  | 
At least two different cyber espionage gangs in China appear to be employing uniform tools and techniques, FireEye finds.
Home Depot Breach May Not Be Related To BlackPOS, Target
News  |  9/11/2014  | 
New analysis of the malware earlier identified as a BlackPOS variant leads some researchers to believe that they are two different malware families entirely.
Apple Pay: A Necessary Push To Transform Consumer Payments
Commentary  |  9/11/2014  | 
Apple Pay is a strategic move that will rival PayPal and other contenders in the mobile wallet marketplace. The big question is whether consumers and businesses are ready to ditch the plastic.
Privacy, Security & The Geography Of Data Protection
Commentary  |  9/11/2014  | 
Data generation is global, so why do different parts of the world react differently to the same threat of security breaches and backdoors?
Startup Uncovers Flaws In Mobile Apps, Launches New Security Service
Quick Hits  |  9/11/2014  | 
Wandera says only one of seven US employees is given any guidance on mobile security by the employer.
Google: No Breach In Latest Online Dump Of Credentials
Quick Hits  |  9/11/2014  | 
The online leak of some 5 million username and password combinations consisted of mostly stale or older credentials that don't actually work, Google says.
Apple Pay Ups Payment Security But PoS Threats Remain
News  |  9/10/2014  | 
Apple's new contactless payment tech will not stop point-of-sale breaches like Home Depot and UPS, but it could make those breaches less valuable to attackers.
Security Growing Pangs Loom For 100K+ Sites With Newly Untrusted Certificates
News  |  9/10/2014  | 
Mozilla revokes 1024-bit root certificates in bid to improve Firefox security and similar changes to come for Chrome as Google plans to dump SHA-1 certificates.
Attack Steals Online Banking Credentials From SMBs
News  |  9/10/2014  | 
The "Peter Pan" phish employs Dridex malware, experts say.
InfoSec Book Club: What’s On Your Fall Reading List?
Slideshows  |  9/9/2014  | 
Dark Reading community members share the books that inform and inspire their decisions and interactions as security professionals.
Study: 15 Million Devices Infected With Mobile Malware
Quick Hits  |  9/9/2014  | 
Sixty percent of the infected devices run Android.
Salesforce Passwords At Risk From Dyre
News  |  9/9/2014  | 
Bank credential-stealing malware evolves into targeting SaaS users.
Black Hat & DEF CON: 3 Lessons From A Newbie
Commentary  |  9/9/2014  | 
Security conferences are a lot like metal concerts: Your parents are terrified you're going to die because everyone looks scary, but 98 percent of attendees are really nice people who want to help you learn.
Dark Reading Radio: CISO James Christiansen Shares Experiences
Commentary  |  9/9/2014  | 
Former CISO at GM, Visa, and Experian answers questions about building security programs in large enterprises.
Mobile, Cloud, Partners: Where’s The Weak Link?
Infographics  |  9/9/2014  | 
Your perimeter now incorporates mobile devices, cloud services, and partner networks, so it should be clear that the “moat” method no longer cuts it.
'Kyle & Stan' Parks Malvertising On Amazon, YouTube
Quick Hits  |  9/8/2014  | 
Windows and Macs alike are at risk to sophisticated mutating malware.
UPDATE: Home Depot Confirms Breach; BlackPOS Implicated
Quick Hits  |  9/8/2014  | 
Home Depot confirms there was indeed a breach. Presence of BlackPOS hints that the perpetrators could be the same ones who breached Target.
No End In Sight For Ransomware
Commentary  |  9/8/2014  | 
The screenlocker Kovter, in particular, has shown sharp growth this year. It masquerades as a law enforcement authority and threatens police action if users don’t pay up.
Poll: Significant Insecurity About Internet of Things
Commentary  |  9/5/2014  | 
Fewer than one percent of more than 800 Dark Reading community members are ready for the fast approaching security onslaught of the IoT.
Attacker Infects Healthcare.gov Test Server
News  |  9/5/2014  | 
Federal officials say no consumer data was impacted and second open enrollment period on HealthCare.gov will not be affected.
4 Hurdles To Securing The Internet Of Things
News  |  9/4/2014  | 
Why locking down even the tiniest embedded device is a tall order.
BackOff Not To Blame For GoodWill Breach
News  |  9/4/2014  | 
Rawpos, a "very low risk" infostealer, is responsible for the compromise of roughly 868,000 credit cards.
In Cloud We Trust: A New Model
Commentary  |  9/4/2014  | 
The solution to the problem of data security in the public cloud will require more than a traditional compliance-driven approach.
Home Depot, Other Retailers Get Social Engineered
News  |  9/3/2014  | 
Famed annual contest reveals how many retailers lack sufficient defenses against social engineering.
In China, Cybercrime Underground Activity Doubled In 2013
News  |  9/3/2014  | 
Forget intelligence gathering. Financially motivated cybercrime is booming behind the Great Wall.
Celeb Hack: Is Apple Telling All It Knows?
Commentary  |  9/3/2014  | 
Did Apple have a system-wide data breach? No. Was it complicit through an appalling security lapse by not defending against brute force attacks? You’re darn tootin'!
Apple Not Hacked In Celebrity Nude Photo Breaches
News  |  9/2/2014  | 
"Very targeted attack" on celebrities' Apple usernames, passwords, security questions -- iCloud, Find My iPhone not breached, Apple says.
Home Depot The Latest Hack Victim?
Quick Hits  |  9/2/2014  | 
Home improvement chain--along with law enforcement and banks--are investigating 'unusual activity.'
“Contactless” HCE Payments Promise Simplicity But Is It Secure?
Commentary  |  9/2/2014  | 
Host Card Emulation is a powerful and flexible technology, but like most software-dependent solutions, it can be hacked and exploited.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2006-1318
Published: 2014-09-19
Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, Office 2004 for Mac, and Office X for Mac do not properly parse record lengths, which allows remote attackers to execute arbitrary code via a malformed control in an Office document, aka "Microsoft Office Control Vulnerability."

CVE-2012-2588
Published: 2014-09-19
Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Enterprise 6.5 allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, or (3) Subject header or (4) body in an SMTP e-mail message.

CVE-2012-6659
Published: 2014-09-19
Cross-site scripting (XSS) vulnerability in the admin interface in Phorum before 5.2.19 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-1391
Published: 2014-09-19
QT Media Foundation in Apple OS X before 10.9.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file with RLE encoding.

CVE-2014-3614
Published: 2014-09-19
Unspecified vulnerability in PowerDNS Recursor (aka pdns_recursor) 3.6.x before 3.6.1 allows remote attackers to cause a denial of service (crash) via an unknown sequence of malformed packets.

Best of the Web
Dark Reading Radio