The U.S. government is in a unique position to become a global leader in cybersecurity. But only if it retains the open spirit of the Internet that kick-started the Information Age. By Gavin Reid Vice President, Threat Intelligence, Lancope Inc, 9/1/20150 comments | Read | Post a Comment
KeyRaider stole 225,000 legitimate Apple accounts and slammed devices with ransomware and phony purchases, but only jailbroken gear, mostly in China, is affected.By Sara Peters Senior Editor at Dark Reading, 8/31/20152 comments | Read | Post a Comment
Over 7,000 US business have been victimized by so-called BEC fraud between October 2013 and August 2015 alone, the FBI said in an alert this week.By Jai Vijayan Freelance writer, 8/28/20152 comments | Read | Post a Comment
Sniffing out RATS -- remote access Trojans -- is a challenge for even the most hardened cyber defender. Here’s a guide to help you in the hunt. By Udi Shamir Chief Security Officer, SentinelOne, 8/28/20153 comments | Read | Post a Comment
Security Pro File: Chris Valasek chats up the daunting challenge of topping the Jeep Cherokee hack, '80s Adidas tracksuits, his loathing of coding, and his love for Windows -- and Hall & Oates.By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/28/201510 comments | Read | Post a Comment
Consumers can now expect the same level of security and privacy in the digital realm as they do in the physical. By Tom Kellermann Chief Cybersecurity Office, Trend Micro, 8/27/20158 comments | Read | Post a Comment
Neither prevention nor detection alone is sufficient in today’s cybercrime environment.By Michael Sentonas Vice President, Chief Technology Officer, Security Connected at Intel Security, 8/25/20150 comments | Read | Post a Comment
There are lots of reasons why medical data is so vulnerable but the sheer numbers at risk speak volumes about the scale of the problem. By Marilyn Cohodas Community Editor, Dark Reading, 8/25/201511 comments | Read | Post a Comment
Security ranked alongside marketing and IT ops concerns as important indicators of trust in online sites.By Ericka Chickowski Contributing Writer, Dark Reading, 8/25/20150 comments | Read | Post a Comment
Mysterious death of Argentinian politician potentially tied to his phone's infection with popular remote access tool.By Ericka Chickowski Contributing Writer, Dark Reading, 8/21/20150 comments | Read | Post a Comment
Malicious attacks with firmware privileges can compromise an entire system, so it is especially important to apply measures to reduce the risks.By Jim Walter Director of Advanced Threat Research, Intel Security, 8/19/20150 comments | Read | Post a Comment
Engin Kirda, chief architect of LastLine, joins the Dark Reading News Desk at Black Hat Aug. 5 to explain why most ransomware isn't as scary as we think.By Sara Peters Senior Editor at Dark Reading, 8/18/20152 comments | Read | Post a Comment
Published: 2015-09-02 Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.
Published: 2015-09-02 The vlserver in OpenAFS before 1.6.13 allows remote authenticated users to cause a denial of service (out-of-bounds read and crash) via a crafted regular expression in a VL_ListAttributesN2 RPC.
Published: 2015-09-02 Cross-site scripting (XSS) vulnerability in the MDC Private Message plugin 1.0.0 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the message field in a private message.
Published: 2015-09-01 Cross-site scripting (XSS) vulnerability in js/window.php in the Navis DocumentCloud plugin before 0.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter.