Slide-Show
Latest Content
Page 1 / 2   >   >>
5 Things You Probably Missed In The Verizon DBIR
Slideshows  |  6/25/2015  | 
A look at a few of the lesser-noticed but meaty nuggets in the annual Verizon Data Breach Investigations Report (DBIR).
7 Top Security Quotes From London Technology Week
Slideshows  |  6/19/2015  | 
Tech events across the city hit on IoT, smart cities, mobility and Legos.
Quantifying Shadow Data In The Cloud
Slideshows  |  6/8/2015  | 
Report shows how much data users really are exposing on SaaS services.
10 Security Questions To Ask A Cloud Service Provider
Slideshows  |  5/12/2015  | 
Help the business assess the risks of cloud services with these handy questions.
Twitter's Top 10 Social CISOs
Slideshows  |  4/27/2015  | 
If you work in information security today, you're on Twitter. Or are you?
7 Deadly Sins That Get Users Hacked
Slideshows  |  4/16/2015  | 
How users and their endpoints are leveraged by the bad guys to eventually find their way to critical data
8 Identity & Access Metrics To Manage Breach Risks
Slideshows  |  4/2/2015  | 
Measurables for improving security posture around access controls.
7 Bugs, Breaches, & Compromises To Rock 2015 (So Far)
Slideshows  |  3/30/2015  | 
The year's started off with a bang; will we hear risk management pros whimper?
The 7 Best Social Engineering Attacks Ever
Slideshows  |  3/17/2015  | 
Seven reminders of why technology alone isn't enough to keep you secure.
10 Ways To Measure IT Security Program Effectiveness
Slideshows  |  3/16/2015  | 
The right metrics can make or break a security program (or a budget meeting).
Mobile Security By The Numbers
Slideshows  |  3/2/2015  | 
Rounding up the latest research on mobile malware and security practices.
7 Things You Should Know About Secure Payment Technology
Slideshows  |  2/24/2015  | 
Despite the existence of EMV and Apple Pay, we're a long way from true payment security, especially in the US.
20 Startups To Watch In 2015
Slideshows  |  12/29/2014  | 
Check our list of security startups sure to start (or continue) making waves in the coming year.
CISO Holiday Bookshelf
Slideshows  |  12/22/2014  | 
A selection of interesting security reads perfect as gifts from and to the typical CISO.
Stocking Stuffers For Happy Hacking
Slideshows  |  12/15/2014  | 
Find that perfect gift for your co-workers and much-loved white hats without breaking the bank.
How To Become a CISO: Top Tips
Slideshows  |  12/8/2014  | 
A look at the best career advice for aspiring CISOs from people who've reached the top.
Why We Need Better Cyber Security: A Graphical Snapshot
Slideshows  |  11/28/2014  | 
By 2022, demand for security industry professionals will grow 37%.
Cloud Security By The Numbers
Slideshows  |  11/21/2014  | 
Quantifying the perceptions around cloud security practices.
The Year Of The Retailer Data Breach
Slideshows  |  11/17/2014  | 
This year's wave of attacks was more dramatic in its widespread scope and seemingly constant battering of more than a dozen big box chains.
10 Cool Security Tools Open-Sourced By The Internet's Biggest Innovators
Slideshows  |  11/3/2014  | 
Google, Facebook, Netflix, and others have all offered up tools they've developed in-house to the community at large.
The Internet of Things: 7 Scary Security Scenarios
Slideshows  |  10/16/2014  | 
The IoT can be frightening when viewed from the vantage point of information security.
Be Aware: 8 Tips for Security Awareness Training
Slideshows  |  9/29/2014  | 
Hint: One giant security training session to rule them all is not the way to go.
7 Reasons To Love Passwords
Slideshows  |  9/17/2014  | 
Passwords are often ridiculed, but there are some reasons they should be your nearest and dearest authentication factor.
InfoSec Book Club: What’s On Your Fall Reading List?
Slideshows  |  9/9/2014  | 
Dark Reading community members share the books that inform and inspire their decisions and interactions as security professionals.
Hacker Couture: As Seen At Black Hat USA, BSides, DEF CON
Slideshows  |  8/18/2014  | 
'Leet tattoos, piercings, mega-beards, (the real) John McAfee, and even a cute puppy were among the colorful sights in Las Vegas this month.
6 Biometric Factors That Are Working Today
Slideshows  |  8/12/2014  | 
From fingerprints to wearable ECG monitors, there are real options in the market that may relegate the despised password to the dustbin of history.
10 Dramatic Moments In Black Hat History
Slideshows  |  7/31/2014  | 
From Google hacking to ATM "jackpotting" to the NSA -- Black Hat has had some memorable moments over the years.
7 Black Hat Sessions Sure To Cause A Stir
Slideshows  |  7/22/2014  | 
At Black Hat, researchers will point out the weaknesses in everything from the satellites in outer space to the thermostat in your home.
Ransomware: 5 Threats To Watch
Slideshows  |  7/17/2014  | 
Cyber criminals have kicked it up a notch with nasty malware that locks you out of your machine and holds it for ransom.
6 Things That Stink About SSL
Slideshows  |  7/9/2014  | 
Users might not care to trust the very mechanism that's supposed to provide online trust.
Hacker Movies We Love & Hate
Slideshows  |  7/1/2014  | 
Check out Dark Reading community members' favorite hacker movie hits and misses. Then add your picks in the comments section.
Privacy, Cybercrime Headline the Infosecurity Europe Conference
Slideshows  |  5/2/2014  | 
Attendees debate NSA surveillance, privacy reforms, cybercrime defenses, and sharpen their CISO skills.
Slide Show: 20 Security Startups To Watch
Slideshows  |  1/31/2014  | 
Cloud security, mobile security, advanced behavioral detection, and a few other surprises mark this latest crop of newcomers
10 Free Or Low-Cost Network Discovery And Mapping Tools
Slideshows  |  1/17/2014  | 
Understand your network so you can defend it better
Slide Show: 8 Effective Data Visualization Methods For Security Teams
Slideshows  |  12/31/2013  | 
Getting the most out of security analytics data sets, large or small, by visualizing the information
9 Notorious Hackers Of 2013
Slideshows  |  12/27/2013  | 
This year's hacking hall of shame includes members of Anonymous and the Blackhole cybercrime gang, plus state-sponsored groups.
Slide Show: The Coolest Hacks Of 2013
Slideshows  |  12/23/2013  | 
A look back at some of the year's most extreme, creative, and -- in some cases -- just plain bizarre hacks by security researchers
Android Security: 8 Signs Hackers Own Your Smartphone
Slideshows  |  11/29/2013  | 
Security experts share tips on how to tell if attackers are in control of your Android smartphone.
Slide Show: 10 Free Network Defense Tools
Slideshows  |  10/28/2013  | 
Affordably protect the perimeter and beyond with these handy network security utilities and toolkits
Iris Scans: Security Technology In Action
Slideshows  |  8/28/2013  | 
Iris-based security scans are the stuff of sci-fi movies, but NIST research shows how the technology can now be used in the real world to reliably identify individuals.
Slide Show: The Sights Of Black Hat
Slideshows  |  8/6/2013  | 
A photo recap of a week of research, crowds and parties at Black Hat USA 2013
Slide Show: 10 Ways Attackers Automate Malware Production
Slideshows  |  6/18/2013  | 
Peeking into an attacker's toolbox to see how malware production is automated and the Internet is flooded with millions of unique malware applications
Who Is Syrian Electronic Army: 9 Facts
Slideshows  |  5/16/2013  | 
Syrian hackers claim to battle American imperialism, media bias and Angelina Jolie.
10 Top Password Managers
Slideshows  |  4/30/2013  | 
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.
Slide Show: 8 Egregious Examples Of Insider Threats
Slideshows  |  4/9/2013  | 
Real-world case studies from the CERT Insider Threat Center
Slide Show: 10 Password Database Fails
Slideshows  |  3/12/2013  | 
Evernote's most recent password breach is the same refrain from a song the industry has been singing for a while -- check out some of the worst password cache compromises
Anonymous: 10 Things We've Learned In 2013
Slideshows  |  2/28/2013  | 
The Anonymous hacker group continues to seek equal measures of revenge, justice and reform -- preferably through chaotic means -- for perceived wrongdoings.
10 Free SMB Security Tools
Slideshows  |  2/1/2013  | 
This slide show features an assortment of solutions that SMBs can use to minimize their security spend
Military Drones Present And Future: Visual Tour
Slideshows  |  12/14/2012  | 
The Pentagon's growing fleet of unmanned aerial vehicles ranges from hand-launched machines to the Air Force's experimental X-37B space plane.
Slide Show: 10 Security-Service Startups To Remember In 2012
Slideshows  |  12/11/2012  | 
With the security services market growing by more than 23 percent per year, it's no wonder that 2012 had its share of startup launches and young companies taking off
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice post
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1750
Published: 2015-07-01
Open redirect vulnerability in nokia-mapsplaces.php in the Nokia Maps & Places plugin 1.6.6 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the href parameter to page/place.html. NOTE: this was originally reported as cross-sit...

CVE-2014-1836
Published: 2015-07-01
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.

CVE-2015-0848
Published: 2015-07-01
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.

CVE-2015-1330
Published: 2015-07-01
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vecto...

CVE-2015-1950
Published: 2015-07-01
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report