News & Commentary
Latest Content tagged with Endpoint
Page 1 / 2   >   >>
RAT Vulnerabilities Turn Hackers into Victims
News  |  6/23/2017  | 
A small number of Remote Administration Tools have vulnerabilities which can enable attack targets to turn the tables on threat actors.
Two Arrested for Microsoft Network Intrusion
Quick Hits  |  6/22/2017  | 
UK authorities arrest two men for allegedly breaking into Microsoft's network with the intent to steal customer data from the software giant.
WannaCry? Youre Not Alone: The 5 Stages of Security Grief
Commentary  |  6/22/2017  | 
As breach after breach hits the news, security professionals cope with the classic experiences of denial, anger, bargaining, depression, and acceptance.
Consumer Businesses Have False Confidence in their Security: Deloitte
Quick Hits  |  6/21/2017  | 
Consumer business executives are confident in their ability to respond to cyberattacks but fail to document and test response plans.
Trusted IDs Gain Acceptance in Smart Building Environment
Quick Hits  |  6/20/2017  | 
A majority of survey respondents believe identities can be connected across multiple systems and devices through a single ID card or mobile phone.
Data Breach Costs Drop Globally But Increase in US
News  |  6/20/2017  | 
The average total cost of a data breach declined 10% year-over-year around the world, but in the US edged upward by 5%.
Apple iOS Threats Fewer Than Android But More Deadly
News  |  6/20/2017  | 
Data leakage and corruption haunt iOS and Android mobile apps the most, a new study shows.
Cybersecurity Fact vs. Fiction
Commentary  |  6/20/2017  | 
Based on popular media, it's easy to be concerned about the security of smart cars, homes, medical devices, and public utilities. But how truly likely are such attacks?
Rise of Nation State Threats: How Can Businesses Respond?
News  |  6/19/2017  | 
Cybersecurity experts discuss nation-state threats of greatest concerns, different types of attacks, and how organization can prepare.
Invisible Invaders: Why Detecting Bot Attacks Is Becoming More Difficult
Commentary  |  6/19/2017  | 
Traditional methods can't block the latest attackers, but a behavioral approach can tell the difference between bots and humans.
Samsung KNOX Takes Some Knocks
News  |  6/15/2017  | 
Researcher at Black Hat USA will reveal Samsung KNOX 2.6 vulnerabilities and bypass techniques, and notes that new KNOX 2.8 may be at risk as well.
1 Million Endpoints Exposed on Public Internet via Microsoft File-Sharing Services
News  |  6/15/2017  | 
Research on global Internet security posture found endpoints leaving Microsoft SMB file-sharing systems wide open online, a finding that explains the rapid spread of WannaCry, Rapid7 says.
Climbing the Security Maturity Ladder in Cloud
Commentary  |  6/15/2017  | 
These five steps will insure that you achieve the broadest coverage for onboarding your most sensitive workloads.
Hospital Email Security in Critical Condition as DMARC Adoption Lags
News  |  6/14/2017  | 
Healthcare providers put patient data at risk by failing to protect their email domains with DMARC adoption.
Microsoft Security Updates Include Windows XP, Server 2003
News  |  6/14/2017  | 
Microsoft extends its monthly security updates to respond to a rise in cyberattacks and fix serious flaws in Windows XP and Windows Server 2003.
How Bad Data Alters Machine Learning Results
News  |  6/13/2017  | 
Machine learning models tested on single sources of data can prove inaccurate when presented with new sources of information.
Businesses Spend 1,156 Hours Per Week on Endpoint Security
News  |  6/13/2017  | 
Insecure endpoints cost businesses millions of dollars, and hours of productivity, as they struggle to detect and contain threats.
WannaCry 'Scareware' Driving Downloads of Bogus Anti-Virus Apps
Quick Hits  |  6/13/2017  | 
Fake anti-virus apps account for 12.2% of active AV apps in the Google Play store, of which roughly one in 10 are blacklisted, according to a report released today.
New Malware-as-a-Service Offerings Target Mac OS X
News  |  6/12/2017  | 
MacSpy and MacRansom are two early variants of malware-as-a-service portals targeting the broader population of Mac users.
New Attack Method Delivers Malware Via Mouse Hover
News  |  6/9/2017  | 
'Mouseover' technique relies on users hovering over hyperlinked text and images in Microsoft PowerPoint files to drop Trojan.
Microsoft to Buy Hexadite for AI, Enterprise Security
News  |  6/8/2017  | 
Acquisition of Israeli security startup aims to strengthen Windows 10 security with artificial intelligence, company says.
Outdated Operating Systems, Browsers Correlate with Real Data Breaches
News  |  6/8/2017  | 
Study shows companies running out-of-date OSes were three times more likely to suffer a data breach, and those with the outdated browsers, two times more likely.
Why Compromised Identities Are ITs Fault
Commentary  |  6/7/2017  | 
The eternal battle between IT and security is the source of the problem.
Balancing the Risks of the Internet of Things
Commentary  |  6/7/2017  | 
Do the benefits of an Internet-connected coffee maker really outweigh its security issues?
Interpol Analyzes Global Response to WannaCry Attack
Quick Hits  |  6/7/2017  | 
Interpol cybercrime unit chiefs gather to evaluate the global extent of WannaCry and track criminals via blockchain analysis.
Why Phishing Season Lasts All Year for Top US Retailers
Commentary  |  6/6/2017  | 
No major brand is immune from cyber squatters; the more popular the company, the more look-alike domains phishers register as bait. Here are some techniques to watch out for.
Slack, Telegram, Other Chat Apps Being Used as Malware Control Channels
News  |  6/6/2017  | 
Cybercriminal are abusing third-party chat apps as command-and-control infrastructures to spread their malware.
Advice for Windows Migrations: Automate as Much as Possible
Commentary  |  6/6/2017  | 
The security lessons Riverside Health System learned when moving to Windows 7 will help it quickly move to Windows 10.
Sabre, Travelport Hacker Sentenced to Prison
Quick Hits  |  6/6/2017  | 
A West African man who stole airlines tickets from Global Distribution System companies via a phishing campaign and fraud operation was sentenced to prison for four years and 10 months.
WannaCry Exploit Could Infect Windows 10
News  |  6/6/2017  | 
The EternalBlue remote kernel exploit used in WannaCry could be used to infect unpatched Windows 10 machines with malware, researchers find.
Number of CISOs Rose 15% This Year
News  |  6/5/2017  | 
Although the number of CISOs increased to 65% of organizations, it could just be a case of "window dressing," new ISACA report shows.
Majority of DDoS Attacks are Short, Low-Volume Bursts
Quick Hits  |  6/5/2017  | 
DDoS attacks largely fall into the camp of short, low-volume sieges, but large-volume attacks are sharply on the rise, according to a study released today.
Internet Society Takes On IoT, Website Security, Incident Response via OTA Merger
News  |  6/1/2017  | 
What happens now that the Online Trust Alliance - which includes Microsoft, Symantec, Twitter, and other big names - will be under the umbrella of the global Internet organization?
FBI: 8 Steps to Prevent Phishing Attacks
Quick Hits  |  6/1/2017  | 
Federal agency offers up best practices for businesses to lock down their operations against phishing attacks.
DNS Is Still the Achilles Heel of the Internet
Partner Perspectives  |  6/1/2017  | 
Domain Name Services is too important to do without, so we better make sure its reliable and incorruptible
Google Arms Gmail Security with Machine Learning
News  |  5/31/2017  | 
Google rolls out four security updates to protect enterprise Gmail accounts from phishing, data loss, and other threats.
The Case for Disclosing Insider Breaches
Commentary  |  5/31/2017  | 
Too often organizations try to sweep intentional, accidental or negligent employee theft of data under the rug. Heres why they shouldnt.
Most Security Pros Expect to Suffer Cyberattacks via Unsecured IoT
News  |  5/31/2017  | 
A new report shows the majority of security professionals believe within the next two years they will be victims of DDoS and other attacks due to unsecured IoT devices.
The Cons of a 'Silver Bullet' Approach to Endpoint Defense
News  |  5/31/2017  | 
Companies relying on individual security solutions won't find one is a 'silver bullet' that will provide seamless protection.
Rethinking Vulnerabilities: Network Infrastructure as a Software System
Commentary  |  5/31/2017  | 
Increasing complexity is putting networks at risk. It's time to shift our security approach and take some lessons from software development.
Cisco and IBM Team Up on Security
Quick Hits  |  5/31/2017  | 
The two tech titans enter into an agreement to collaborate on technology, services, and threat intelligence.
Cybercrime Costs to Reach $8 Trillion by 2022
Quick Hits  |  5/30/2017  | 
Some 2.8 billion data records expected to be breached in 2017, according to a report released today by Juniper Research.
Chipotle Dishes Details on Data Breach
Quick Hits  |  5/30/2017  | 
An investigation into the Chipotle security incident announced April 25 confirmed a timeline of attack and type of customer information exposed.
Securing IoT Devices Requires a Change in Thinking
Commentary  |  5/30/2017  | 
There's no magic bullet for IoT security, but there are ways to help detect and mitigate problems.
FTC: It Takes Criminals Just 9 Minutes to Use Stolen Consumer Info
Quick Hits  |  5/26/2017  | 
Federal Trade Commission experiment lured hackers to learn about how they use stolen consumer information.
Elections, Deceptions & Political Breaches
Commentary  |  5/26/2017  | 
Political hacks have many lessons for the business world.
8 Most Overlooked Security Threats
Slideshows  |  5/26/2017  | 
Businesses know the obvious security threats to watch for, but some of the biggest dangers may not at top-of-mind.
WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows
News  |  5/25/2017  | 
But a Chinese-language link doesn't shoot down theories of the North Korean Lazarus Group's involvement in the ransomware worm attacks, say language experts at Flashpoint.
WannaCry Gives Consumers a First Look into Ransomware
Quick Hits  |  5/25/2017  | 
Although ransomware has been around for two years, it took the fast-moving and expansive WannaCry to provide a majority of consumers their first glimpse, according to a study released today.
WannaCry: The North Korea Debate
News  |  5/24/2017  | 
Researchers split over whether an infamous North Korean hacking group, an affiliate, or another attacker altogether, is behind the epic ransomware worm.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
The Dark Reading Security Spending Survey
The Dark Reading Security Spending Survey
Enterprises are spending an unprecedented amount of money on IT security where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download the report and find out what they had to say.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.