News & Commentary

Latest Content tagged with Privacy
Page 1 / 2   >   >>
Google Rolls Out New Security Features for Chrome Enterprise
Quick Hits  |  3/16/2018
The business-friendly browser now includes new admin controls, EMM partnerships, and additions to help manage Active Directory.
Voice-Operated Devices, Enterprise Security & the 'Big Truck' Attack
Commentary  |  3/15/2018
The problem with having smart speakers and digital assistants in the workplace is akin to having a secure computer inside your office while its wireless keyboard is left outside for everyone to use.
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
News  |  3/14/2018
Researchers at Black Hat Asia will demonstrate a new framework they created for catching and studying Apple MacOS malware.
SEC Charges Former Equifax Exec with Insider Trading
Quick Hits  |  3/14/2018
CIO of a US business unit within Equifax had reportedly learned of the company's data breach and sold his shares for nearly $1 million.
Medical Apps Come Packaged with Hardcoded Credentials
News  |  3/14/2018
Vulnerabilities in DocuTrac applications also include weak encryption, according to Rapid7.
AMD Investigating Report of Vulnerabilities in its Microprocessors
Quick Hits  |  3/13/2018
Israel-based firm says it found critical bugs in AMD's newest chip families.
Microsoft Remote Access Protocol Flaw Affects All Windows Machines
News  |  3/13/2018
Attackers can exploit newly discovered critical crypto bug in CredSSP via a man-in-the-middle attack and then move laterally within a victim network.
Malware 'Cocktails' Raise Attack Risk
News  |  3/13/2018
Malware mash-ups hiding in encrypted traffic are boosting attack numbers and increasing the danger to data, according to recent reports.
Chinese APT Backdoor Found in CCleaner Supply Chain Attack
News  |  3/12/2018
Avast discovers ShadowPad tool for use in apparent planned third stage of the targeted attack campaign.
Georgia Man Pleads Guilty to Business Email Compromise Attacks
Quick Hits  |  3/12/2018
Kerby Rigaud has pleaded guilty to using BEC attacks in attempts to steal more than $1 million from US businesses.
DevSecOps: The Importance of Building Security from the Beginning
Commentary  |  3/9/2018
Here are four important areas to tackle in order to master DevSecOps: code, privacy, predictability, and people.
Privilege Abuse Attacks: 4 Common Scenarios
Commentary  |  3/7/2018
It doesn't matter if the threat comes from a disgruntled ex-employee or an insider anticipating financial gain, privilege abuse patterns are pretty much the same, and they're easy to avoid.
What Enterprises Can Learn from Medical Device Security
Commentary  |  3/1/2018
In today's cloud-native world, organizations need a highly distributed approach that ties security to the workload itself in order to prevent targeted attacks.
Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples
Slideshows  |  2/28/2018
From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Greys Anatomy, hacking themes now run deep in todays TV shows.
How to Secure 'Permissioned' Blockchains
Commentary  |  2/28/2018
At the heart of every blockchain is a protocol that agrees to the order and security of transactions in the next block. Here's how to maintain the integrity of the chain.
SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks
Quick Hits  |  2/22/2018
New agency guidance statement also says company officials, execs can't trade stocks if they have unannounced information on a security breach at the company.
13 Russians Indicted for Massive Operation to Sway US Election
News  |  2/16/2018
Russian nationals reportedly used stolen American identities and infrastructure to influence the 2016 election outcome.
Can Android for Work Redefine Enterprise Mobile Security?
Commentary  |  2/13/2018
Google's new mobility management framework makes great strides in addressing security and device management concerns while offering diverse deployment options. Here are the pros and cons.
Passwords: 4 Biometric Tokens and How They Can Be Beaten
Commentary  |  1/31/2018
Authentication security methods are getting better all the time, but they are still not infallible.
K-12 Study Gives Schools Low Marks for Protecting Student Privacy Online
News  |  1/31/2018
Survey says local school districts and education departments lack even the most basic security and privacy safeguards.
Digital Extortion to Expand Beyond Ransomware
News  |  1/30/2018
In the future of digital extortion, ransomware isn't the only weapon, and database files and servers won't be the only targets.
6 Tips for Building a Data Privacy Culture
Slideshows  |  1/26/2018
Experts say it's not enough to just post data classification guidelines and revisit the topic once a year. Companies have to build in privacy by design.
House Passes Bill to Renew NSA's Warrantless Surveillance Program
Quick Hits  |  1/12/2018
The bill passed without an amendment which would require a warrant to analyze Americans' incidentally collected data.
Microsoft Launches 'Private Conversations' in Skype
Quick Hits  |  1/11/2018
New feature uses Signal Protocol for strong encryption.
Privacy: The Dark Side of the Internet of Things
Commentary  |  1/11/2018
Before letting an IoT device into your business or home, consider what data is being collected and where it is going.
Vulnerable Mobile Apps: The Next ICS/SCADA Cyber Threat
News  |  1/11/2018
Researchers find nearly 150 vulnerabilities in SCADA mobile apps downloadable from Google Play.
20 Cybersecurity Vendors Getting Venture Capital Love
Slideshows  |  1/9/2018
VCs splashed a record $4B in funding in the cybersecurity pool - here are some highlights among the early- to middle-stage startups who snagged big deals last year.
Wi-Fi Alliance Launches WPA2 Enhancements and Debuts WPA3
News  |  1/8/2018
WPA2 protocol enhancements bring stronger security protection and best practices, while new WPA3 protocol offers new security capabilities.
China Shuts Down 13,000 Websites for Breaking Internet Laws
Quick Hits  |  12/29/2017
The government says its rules are to protect security and stability, but some say they are repressive.
Digital Forensics & the Illusion of Privacy
Commentary  |  12/21/2017
Forensic examiners don't work for bounties. They do what is required to catch criminals, pedophiles, or corporate embezzlers, and now their important security research is finally being acknowledged.
Oracle Product Rollout Underscores Need for Trust in the Cloud
News  |  12/11/2017
Oracle updates its Identity SOC and management cloud with security tools to verify and manage users trusted with access to cloud-based data and applications.
Gartner: IT Security Spending to Reach $96 Billion in 2018
News  |  12/8/2017
Identity access management and security services to drive worldwide spending growth.
Time to Pull an Uber and Disclose Your Data Breach Now
Commentary  |  11/22/2017
There is never a good time to reveal a cyberattack. But with EU's GDPR looming, the fallout is only going to get harder and more expensive if you wait.
A Call for Greater Regulation of Digital Currencies
News  |  11/21/2017
A new report calls for international collaboration to create more transparency with virtual currencies and track money used for cybercrime.
We're Still Not Ready for GDPR? What is Wrong With Us?
Commentary  |  11/17/2017
The canary in the coalmine died 12 years ago, the law went into effect 19 months ago, but many organizations still won't be ready for the new privacy regulations when enforcement begins in May.
Who Am I? Best Practices for Next-Gen Authentication
Commentary  |  11/15/2017
By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords.
Emerging IT Security Technologies: 13 Categories, 26 Vendors
Slideshows  |  11/13/2017
A rundown of some of the hottest security product areas, and vendors helping to shape them.
Yahoo's Ex-CEO Mayer Calls Out Russian Hackers
Quick Hits  |  11/8/2017
Former Yahoo Chief Executive Marissa Mayer apologizes for massive data breach that exposed billions of user accounts.
Cybercriminals Employ 'Driveby' Cryptocurrency Mining
News  |  11/8/2017
Mining digital coins is a legal activity, but cybercriminals have discovered a new way to inject malware to perform the task.
Inhospitable: Hospitality & Dinings Worst Breaches in 2017
Slideshows  |  11/8/2017
Hotels and restaurants are in the criminal crosshairs this year.
How Law Firms Can Make Information Security a Higher Priority
Commentary  |  11/8/2017
Lawyers always have been responsible for protecting their clients' information, but that was a lot easier to do when everything was on paper. Here are four best practices to follow.
Less Than One-Third of People Use Two-Factor Authentication
News  |  11/7/2017
The number of 2FA users is still lower than expected, but most adopters started voluntarily, researchers found.
Hiring Outside the Box in Cybersecurity
Commentary  |  11/7/2017
Candidates without years of experience can still be great hires, as long as they are ready, willing, and able.
How I Infiltrated a Fortune 500 Company with Social Engineering
Commentary  |  11/7/2017
Getting into the company proved surprisingly easy during a contest. Find out how to make your company better prepared for real-world attacks.
10 Mistakes End Users Make That Drive Security Managers Crazy
Slideshows  |  11/2/2017
Here's a list of common, inadvertent missteps end users make that can expose company data.
Will New Ownership Open New Opportunities for Digital Cert Vendors?
News  |  11/1/2017
Francisco Partners acquires majority stake in Comodo CA; DigiCert completes purchase of Symantec's SSL cert business.
Why Data Breach Stats Get It Wrong
Commentary  |  10/26/2017
It's not the size of the stolen data dump that is important. It's the window between the date of the breach and the date of discovery that represents the biggest threat.
Bad Rabbit Dies Down But Questions Remain
News  |  10/25/2017
The origins of the rapid-fire ransomware attack campaign affecting mainly Russian targets remain a bit of a mystery.
The Week in Crypto: Bad News for SSH, WPA2, RSA & Privacy
News  |  10/20/2017
Between KRACK, ROCA, new threats to SSH keys, and the European Commission's loosey-goosey stance on encryption backdoors, it's been a difficult time for cryptography.
What's Next after the SEC 'Insider Trading' Breach?
Commentary  |  10/19/2017
Last month's hack of the Securities and Exchange Commission may prove to be the most high-profile corporate gatekeeper attack to date. But it definitely won't be the last.
Page 1 / 2   >   >>

Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Pat Osborne, Principal - Executive Consultant at Outhaul Consulting, LLC, & Cybersecurity Advisor for the Security Innovation Center,  3/12/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.