Dark Reading Article Boards
Latest Message Boards
Page 1 / 2   >   >>
1.4 Billion Data Records Exposed in 2016 Breaches
Last Message: 3/28/2017
 |  Comments: 3
Two Israeli Youths May Be Charged for vDOS Operation
Last Message: 3/28/2017
 |  Comments: 2
Data Visualization: Keeping an Eye on Security
Last Message: 3/28/2017
 |  Comments: 1
Global Cybercrime Sweep Targeted Young DDoS Attackers
Last Message: 3/28/2017
 |  Comments: 1
Cartoon: Brought to You from the Wikileaks Channel
Last Message: 3/27/2017
 |  Comments: 11
Intro to Cyber Insurance: 7 Questions to Ask
Last Message: 3/27/2017
 |  Comments: 9
Hacked Robots Present a New Insider Threat
Last Message: 3/27/2017
 |  Comments: 10
US-CERT Warns That HTTPS Inspection Tools Weaken TLS
Last Message: 3/27/2017
 |  Comments: 2
10 Security Certifications To Boost Your Career
Last Message: 3/27/2017
 |  Comments: 18
And Now A PREDATOR To Fight DNS Domain Abuse
Last Message: 3/26/2017
 |  Comments: 6
Why Social Media Sites Are The New Cyber Weapons Of Choice
Last Message: 3/26/2017
 |  Comments: 20
Bug Bounty Programs are Growing Up Fast and Paying More
Last Message: 3/25/2017
 |  Comments: 1
Hackers Cash In On ATMs
Last Message: 3/25/2017
 |  Comments: 8
Machine Learning For Cybersecurity Not Cybercrime
Last Message: 3/24/2017
 |  Comments: 1
US May Charge North Korea in Bangladesh Bank Cybertheft
Last Message: 3/24/2017
 |  Comments: 1
Phishing Your Employees for Schooling & Security
Last Message: 3/24/2017
 |  Comments: 11
Awareness Training Can Help Quell Ransomware Attacks
Last Message: 3/24/2017
 |  Comments: 2
US Senate Overturns Obama Consumer Privacy Rule
Last Message: 3/24/2017
 |  Comments: 1
America's JobLink Suffers Security Breach
Last Message: 3/24/2017
 |  Comments: 1
Registration Opens for U.S. Cyber Quests Competition
Last Message: 3/24/2017
 |  Comments: 1
Two Charged In Gas Station Card-Skimming Scheme
Last Message: 3/24/2017
 |  Comments: 2
Ethical Hacking: The Most Important Job No One Talks About
Last Message: 3/23/2017
 |  Comments: 4
5 Mr. Robot Hacks That Could Happen in Real Life
Last Message: 3/23/2017
 |  Comments: 4
Future of the SIEM
Last Message: 3/23/2017
 |  Comments: 2
Heartbleed Attack Targeted Enterprise VPN
Last Message: 3/23/2017
 |  Comments: 5
Windows 'DoubleAgent' Attack Turns AV Tools into Malware
Last Message: 3/23/2017
 |  Comments: 1
The Limitations Of Phishing Education
Last Message: 3/23/2017
 |  Comments: 1
In a Cybersecurity Vendor War, the End User Loses
Last Message: 3/23/2017
 |  Comments: 3
This Week On Dark Reading: Events Calendar
Last Message: 3/23/2017
 |  Comments: 1
SOC Maturity By The Numbers
Last Message: 3/22/2017
 |  Comments: 2
Star Trek-Themed Ransomware Demands New Crypto-Currency
Last Message: 3/22/2017
 |  Comments: 2
Android Security: 8 Signs Hackers Own Your Smartphone
Last Message: 3/21/2017
 |  Comments: 21
Security Metrics: Its All Relative
Last Message: 3/21/2017
 |  Comments: 4
Nigerian Cybercrime Matures, Morphs
Last Message: 3/21/2017
 |  Comments: 1
Hacked Sites Up By 32% in 2016 Over 2015, Says Google
Last Message: 3/21/2017
 |  Comments: 1
Cisco Issues Advisory On Flaw In Hundreds Of Switches
Last Message: 3/21/2017
 |  Comments: 1
IRS Warns Taxpayers of Email Scams
Last Message: 3/21/2017
 |  Comments: 2
'Zero Trust': The Way Forward in Cybersecurity
Last Message: 3/21/2017
 |  Comments: 7
Symantec To Buy LifeLock At $2.3 Billion
Last Message: 3/20/2017
 |  Comments: 2
Women Still Only 11% Of Global InfoSec Workforce
Last Message: 3/20/2017
 |  Comments: 4
American Hacker Arrested For 2014 JP Morgan Chase Breach
Last Message: 3/19/2017
 |  Comments: 4
The Future Of ATM Hacking
Last Message: 3/18/2017
 |  Comments: 4
Consumer Reports to Grade Products on Cybersecurity
Last Message: 3/18/2017
 |  Comments: 3
Google Removes Chamois Apps Botnet from Play Store
Last Message: 3/17/2017
 |  Comments: 1
Personal Data Leak Affects 33 Million US Employees
Last Message: 3/17/2017
 |  Comments: 1
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.