Attacks/Breaches
News & Commentary
Video: Tech Hygiene Bad Habits, 3D Stock Portfolios
Andrew Conry Murray, Director of Content & Community, InteropCommentary
This Week In 60 Seconds looks at bad tech hygiene habits, using Oculus Rift for 3D stock portfolios, security risks during the holiday shopping season, and more.
By Andrew Conry Murray Director of Content & Community, Interop, 11/21/2014
Comment0 comments  |  Read  |  Post a Comment
The Week When Attackers Started Winning The War On Trust
Kevin Bocek,  VP Security Strategy & Threat Intelligence, VenafiCommentary
The misuse of keys and certificates is not exotic or hypothetical. It’s a real threat that could undermine most, if not all, critical security controls, as recent headlines strongly show.
By Kevin Bocek VP Security Strategy & Threat Intelligence, Venafi, 11/21/2014
Comment0 comments  |  Read  |  Post a Comment
New Citadel Attack Targets Password Managers
Jai Vijayan, Freelance writerNews
IBM researchers have found signs that the prolific data steal Trojan is now being used to attack widely used password managers.
By Jai Vijayan Freelance writer, 11/20/2014
Comment2 comments  |  Read  |  Post a Comment
Killing Passwords: Don’t Get A-Twitter Over ‘Digits’
Dave Kearns, Analyst, Kuppinger-ColeCommentary
Twitter’s new service that eliminates passwords for authentication actually makes your mobile device less secure.
By Dave Kearns Analyst, Kuppinger-Cole, 11/19/2014
Comment5 comments  |  Read  |  Post a Comment
The Rise Of The Resilient Mobile Botnet
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New report on what researchers call one of the 'most sophisticated mobile botnets online' shows how profitable mobile malware has become.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/19/2014
Comment0 comments  |  Read  |  Post a Comment
'Misdial Trap' Phone Scam Hits Financial Services
Sara Peters, Senior Editor at Dark ReadingQuick Hits
One in six financial institutions victimized by this new scam.
By Sara Peters Senior Editor at Dark Reading, 11/18/2014
Comment2 comments  |  Read  |  Post a Comment
State Dept. Breach Heightens Concerns Over Resilience Of Government Networks
Jai Vijayan, Freelance writerNews
The department is the fourth federal entity in recent weeks to disclose a data breach.
By Jai Vijayan Freelance writer, 11/18/2014
Comment6 comments  |  Read  |  Post a Comment
Deconstructing the Cyber Kill Chain
Giora Engel, VP Product & Strategy, LightCyberCommentary
As sexy as it is, the Cyber Kill Chain model can actually be detrimental to network security because it reinforces old-school, perimeter-focused, malware-prevention thinking.
By Giora Engel VP Product & Strategy, LightCyber, 11/18/2014
Comment4 comments  |  Read  |  Post a Comment
The Year Of The Retailer Data Breach
Kelly Jackson Higgins, Executive Editor at Dark Reading
This year's wave of attacks was more dramatic in its widespread scope and seemingly constant battering of more than a dozen big box chains.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/17/2014
Comment3 comments  |  Read  |  Post a Comment
Why Cyber Security Starts At Home
Corey Nachreiner, Director, Security Strategy & Research, WatchGuard TechnologiesCommentary
Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens anywhere on the Internet can eventually affect us all.
By Corey Nachreiner Director, Security Strategy & Research, WatchGuard Technologies, 11/17/2014
Comment13 comments  |  Read  |  Post a Comment
'Bashlite' Malware Leverages ShellShock In BusyBox Attack
Brian Prince, Contributing Writer, Dark ReadingNews
A new version of Bashlite aims to get control of devices running on BusyBox, such as routers.
By Brian Prince Contributing Writer, Dark Reading, 11/14/2014
Comment4 comments  |  Read  |  Post a Comment
NOAA Blames China In Hack, Breaks Disclosure Rules
Sara Peters, Senior Editor at Dark ReadingNews
The National Oceanic and Atmospheric Administration finally confirms that four websites were attacked and taken down in September, but details are sketchy and officials want answers.
By Sara Peters Senior Editor at Dark Reading, 11/13/2014
Comment2 comments  |  Read  |  Post a Comment
Time To Turn The Tables On Attackers
Amit Yoran, President, RSACommentary
As a security industry, we need to arm business with innovative technologies that provide visibility, analysis, and action to prevent inevitable breaches from causing irreparable damage.
By Amit Yoran President, RSA, 11/13/2014
Comment5 comments  |  Read  |  Post a Comment
Retail Hacking: What To Expect This Holiday Season
Kelly Jackson Higgins, Executive Editor at Dark ReadingCommentary
The next Dark Reading Radio episode on Nov. 19 at 1PM ET (10AM PT) features retail security experts from Mandiant and the retail industry.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/13/2014
Comment4 comments  |  Read  |  Post a Comment
The Enemy Who Is Us: DoD Puts Contractors On Notice For Insider Threats
Adam Firestone, President & GM, Kaspersky Government Security SolutionsCommentary
New rule requires US government contractors to gather and report information on insider threat activity on classified networks.
By Adam Firestone President & GM, Kaspersky Government Security Solutions, 11/13/2014
Comment5 comments  |  Read  |  Post a Comment
Expired Antivirus Software No. 1 Cause Of Unprotected Windows 8 PCs
Jai Vijayan, Freelance writerNews
New data from Microsoft shows that nearly 10% of Windows 8 users are running expired AV software on their systems, making them four times more likely to get infected.
By Jai Vijayan Freelance writer, 11/13/2014
Comment2 comments  |  Read  |  Post a Comment
POS Malware Continues To Evolve
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New report out today details three prevalent families.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/11/2014
Comment7 comments  |  Read  |  Post a Comment
Stuxnet 'Patient Zero' Attack Targets Revealed
Sara Peters, Senior Editor at Dark ReadingNews
Researchers name five Iranian industrial control systems companies attacked in 2009-2010, and they question whether USB sticks were really the method of infection.
By Sara Peters Senior Editor at Dark Reading, 11/11/2014
Comment5 comments  |  Read  |  Post a Comment
US Postal Service Suspends Telecommuting Following Massive Data Breach
Jai Vijayan, Freelance writerNews
Employee VPN taken down -- will not be restored until more secure version can be installed, Postal Service says after breach exposes data on 800,000 employees and 2.9 million customers.
By Jai Vijayan Freelance writer, 11/11/2014
Comment4 comments  |  Read  |  Post a Comment
‘Walk & Stalk’: A New Twist In Cyberstalking
Ken Munro,  Partner & Founder, Pen Test Partners LLPCommentary
How hackers can turn Wifi signals from smartphones and tablets into a homing beacon that captures users' online credentials and follows them, undetected, throughout the course of the day.
By Ken Munro Partner & Founder, Pen Test Partners LLP, 11/11/2014
Comment4 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?