Commentary
Content posted in November 2015
How Facebook Bakes Security Into Corporate Culture
Commentary  |  11/30/2015  | 
Security is everyone's responsibility at the famous social network. These five ingredients are what make up the secret sauce.
The Youthful Side Of Hacking
Commentary  |  11/25/2015  | 
If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
Parsing What Is Reasonable In Security, Post FTC v Wyndham
Commentary  |  11/24/2015  | 
In today's regulatory climate, companies can no longer depend on technology solutions alone for example, SIEM -- to protect corporate data and customer privacy. Here's why.
We Need A New Word For Cyber
Commentary  |  11/23/2015  | 
Its time to find an alternative for 'cyber' (an adjective or noun) before the term like 'google' -- becomes a verb.
Introducing RITA for Real Intelligence Threat Analysis
Commentary  |  11/20/2015  | 
SANS' free, new framework can help teams hunt for attackers by extending traditional signature analysis to blacklisted IP addresses and accounts that have multiple concurrent logons to multiple systems.
And Now, A Cyber Arms Race Towards Critical Infrastructure Attacks
Commentary  |  11/19/2015  | 
As traditional explosives give way to 'logic bombs,' the need to protect our industrial networks and systems has never been more important.
DDoS And The Internet's Liability Problem
Commentary  |  11/18/2015  | 
It's past time for an improved liability model to disrupt DDoS.
Dont Toy With The Dark Web, Harness It
Commentary  |  11/16/2015  | 
The Dark Webs sinister allure draws outsized attention, but time-strapped security teams would benefit from knowing what's already circulating in places they don't need Tor or I2P to find.
Dark Reading Radio: A Cybersecurity Generation Gap
Commentary  |  11/16/2015  | 
Millennials--especially young women--not pursuing careers in cybersecurity due to lack of both awareness and interest.
Point of Entry: The Missing Link in the Security Hiring Gap
Commentary  |  11/12/2015  | 
How misguided notions of capability and lack of access to enterprise tools discourage diversity in Infosec.
Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
Commentary  |  11/11/2015  | 
Guided by an organization's internal security experts,'algorithmic assistants' provide a powerful new way to find anomalies and patterns for detecting cyberthreat activity.
Why Threat Intelligence Feels Like A Game Of Connect Four
Commentary  |  11/10/2015  | 
In real life, solving the cybersecurity puzzle has many challenges. But shared wisdom and community defense models are making it easier to connect the dots.
Cybersecurity Skills Gap: Too Good To Be True For Job Seekers?
Commentary  |  11/9/2015  | 
New track at Black Hat Europe explores the special challenges of managing an information security career for both job hunters and job hirers.
What Flu Season Can Teach Us About Fighting Cyberattacks
Commentary  |  11/6/2015  | 
Cybersecurity doesn't have to be an arms race towards complexity if we put people front and center of the solution.
Mature & Unconfident: The Best Information Security Teams Ever!
Commentary  |  11/5/2015  | 
Security through maturity and humility is a workable philosophy with proven results for organizations that are willing to give it a try. Heres why.
BYOD 2015: Data Loss, Data Leaks & Data Breaches
Commentary  |  11/4/2015  | 
The growth of employee-owned devices in the workplace is placing new demands on enterprises struggling to protect both personal and professional data.
Kicking Off A New Era For Policing Cybersecurity
Commentary  |  11/3/2015  | 
In the wake of FTC v. Wyndham, government agencies are becoming more aggressive about protecting corporate data and customer privacy. But the new rules are very much a work in progress.
IPv6 And The Growing DDoS Danger
Commentary  |  11/2/2015  | 
IPv6 and the Internet of Things have arrived -- and with them an enormous potential expansion for distributed denial-of-service (DDoS) attacks.


Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.