Slideshows

Content posted in October 2016
5 Signs Your Smartphone Has Been Hacked
Slideshows  |  10/28/2016  | 
Mobile devices are increasingly popular vectors for cybercriminals targeting the enterprise. How to tell when a smartphone may be under attack.
7 Scary Ransomware Families
Slideshows  |  10/25/2016  | 
Here are seven ransomware variants that can creep up on you.
7 Imminent IoT Threats
Slideshows  |  10/21/2016  | 
Attacks against smart home products, medical devices, SCADA systems, and other newly network-enabled systems signal the beginning of a new wave of attacks against the IoT.
9 Sources For Tracking New Vulnerabilities
Slideshows  |  10/20/2016  | 
Keeping up with the latest vulnerabilities -- especially in the context of the latest threats -- can be a real challenge.
7 Regional Hotbeds For Cybersecurity Innovation
Slideshows  |  10/18/2016  | 
These regions are driving cybersecurity innovation across the US with an abundance of tech talent, educational institutions, accelerators, incubators, and startup activity.
5 Tips For Keeping Small Businesses Secure
Slideshows  |  10/17/2016  | 
In honor of National Cyber Security Awareness Month, a look at that five-step process developed by the BBB and NCSA.
Happy 30th Birthday CFAA!
Slideshows  |  10/14/2016  | 
Six things we still dont know about the Computer Fraud and Abuse Act after all this time.
7 Ways Electronic Voting Systems Can Be Attacked
Slideshows  |  10/13/2016  | 
Pre-election integrity tests and post-election audits and checks should help spot discrepancies and errors, but risks remain.
Inside A Bug-Hunter's Head: 6 Motivators
Slideshows  |  10/7/2016  | 
Who are bug bounty hunters, and why do they hack? We dig inside the motivators driving today's hackers to seek vulnerabilities.
5 Ways To Lock Down Your Login
Slideshows  |  10/4/2016  | 
New public awareness campaign inspired by the White House calls for users to think more carefully about stronger authentication.
16 Innovative Cybersecurity Technologies Of 2016
Slideshows  |  10/3/2016  | 
This year's SINET 16 Innovators were chosen from 82 applicants representing nine countries.


Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now about that mortgage refinance offer from Wells Fargo .....
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-4975
PUBLISHED: 2018-08-14
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (A...
CVE-2018-6970
PUBLISHED: 2018-08-13
VMware Horizon 6 (6.x.x before 6.2.7), Horizon 7 (7.x.x before 7.5.1), and Horizon Client (4.x.x and prior before 4.8.1) contain an out-of-bounds read vulnerability in the Message Framework library. Successfully exploiting this issue may allow a less-privileged user to leak information from a privil...
CVE-2018-14781
PUBLISHED: 2018-08-13
Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolu...
CVE-2018-15123
PUBLISHED: 2018-08-13
Insecure configuration storage in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows remote attacker perform new attack vectors and take under control device and smart home.
CVE-2018-15124
PUBLISHED: 2018-08-13
Weak hashing algorithm in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows unauthenticated attacker extract clear text passwords and get root access on the device.