Dark Reading Article Boards
Latest Message Boards
Page 1 / 2   >   >>
Lights Out: Not So Fast
Last Message: 2/4/2016
 |  Comments: 3
Cybercrime Doesn't Pay As Much As You'd Think
Last Message: 2/4/2016
 |  Comments: 6
More Reasons To Drop The War On Encryption
Last Message: 2/4/2016
 |  Comments: 12
Chipping Away At Credit Card Fraud With EMV
Last Message: 2/4/2016
 |  Comments: 1
Passwords, Email Addresses, Were Most Stolen Data In 2015
Last Message: 2/4/2016
 |  Comments: 1
The Cybersecurity Talent You Seek May Be In-House
Last Message: 2/3/2016
 |  Comments: 1
Wendy's Could Become Test Case For New EMV Liability Rules
Last Message: 2/3/2016
 |  Comments: 4
Encryption Has Its Place But It Isn’t Foolproof
Last Message: 2/3/2016
 |  Comments: 2
7 Signs of Infosec's Groundhog's Day Syndrome
Last Message: 2/2/2016
 |  Comments: 1
How Facebook Bakes Security Into Corporate Culture
Last Message: 2/2/2016
 |  Comments: 4
Big Week For Ransomware
Last Message: 2/2/2016
 |  Comments: 5
Why Threat Intelligence Is Like Teenage Sex
Last Message: 2/1/2016
 |  Comments: 13
Cloud Security: To Scale Safely, Think Small
Last Message: 2/1/2016
 |  Comments: 2
Hot-Patching Tools Another Crack In Apple's Walled Garden
Last Message: 2/1/2016
 |  Comments: 9
When It Comes To Facebook Apps, Be Like Mike -- Not Bill
Last Message: 2/1/2016
 |  Comments: 2
Oracle Retires Java Browser Plug-In
Last Message: 1/31/2016
 |  Comments: 8
Why Cybersecurity Certifications Matter -- Or Not
Last Message: 1/31/2016
 |  Comments: 5
Cloud Security: It’s Become A People Problem
Last Message: 1/29/2016
 |  Comments: 1
Why InfoSec Pros Should Keep A Close Eye On Cyber Efficiency
Last Message: 1/28/2016
 |  Comments: 1
How (And Why) Hackers Target Your Business
Last Message: 1/28/2016
 |  Comments: 6
Medical Device Security Gets Intensive Care
Last Message: 1/28/2016
 |  Comments: 8
'Scarlet Mimic' Hackers Snoop On Minority Activists In China
Last Message: 1/28/2016
 |  Comments: 3
Post-Breach Costs And Impact Can Last Years
Last Message: 1/28/2016
 |  Comments: 11
NetFlow Or sFlow For Fastest DDoS Detection?
Last Message: 1/28/2016
 |  Comments: 11
When The Boss Is Your Biggest Security Risk
Last Message: 1/27/2016
 |  Comments: 9
Black Hat, Data Science, Machine Learning, and… YOU!
Last Message: 1/26/2016
 |  Comments: 2
Hacking Group LulzSec Denies Arrest Report
Last Message: 1/26/2016
 |  Comments: 2
Boldest Cybersecurity Predictions For 2016
Last Message: 1/25/2016
 |  Comments: 5
No Safe Harbor Is Coming -- CISA Made Sure Of It
Last Message: 1/25/2016
 |  Comments: 3
'Asacub' Trojan Converted To Mobile Banking Weapon
Last Message: 1/24/2016
 |  Comments: 2
Measuring Real Risk: The Business View
Last Message: 1/24/2016
 |  Comments: 2
IT Confidence Ticks Down
Last Message: 1/24/2016
 |  Comments: 3
The Apple App Store Incident: Trouble in Paradise?
Last Message: 1/24/2016
 |  Comments: 3
Franchising Ransomware
Last Message: 1/22/2016
 |  Comments: 3
Hackers Cash In On ATMs
Last Message: 1/22/2016
 |  Comments: 4
Macro Malware Is Back
Last Message: 1/22/2016
 |  Comments: 3
Detecting the Undetectable: Windows Registry Attacks
Last Message: 1/22/2016
 |  Comments: 1
HD Moore To Depart Rapid7 For New Venture Capital Gig
Last Message: 1/21/2016
 |  Comments: 1
Former Director Of NSA And CIA Says US Cybersecurity Policy MIA
Last Message: 1/20/2016
 |  Comments: 2
OpenSSH Patches Flaw That Lets Attackers Steal Private Keys
Last Message: 1/20/2016
 |  Comments: 2
Linux Kernel Bug Allows Local-To-Root Privilege Escalation
Last Message: 1/20/2016
 |  Comments: 2
Employee Data More Exposed Than Customer Data
Last Message: 1/20/2016
 |  Comments: 5
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: nice one good
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas in a thought-provoking discussion about the evolving role of the CISO.