News & Commentary
6 Ways To Prepare For The EUs GDPR
Jai Vijayan, Freelance writerNews
In less than 20 months, all US companies doing business in the EU will face new consumer privacy requirements. Heres how to prepare for them.
By Jai Vijayan Freelance writer, 9/30/2016
Comment0 comments  |  Read  |  Post a Comment
EMV: The Anniversary Of One Deadline, The Eve of Another
Sara Peters, Senior Editor at Dark ReadingNews
How merchants and criminals responded since the EMV liability shift for point-of-sale devices one year ago. And what changes can we expect after the liability shift for ATMs, which is just days away?
By Sara Peters Senior Editor at Dark Reading, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Microsoft Launches Cloud-Based Fuzzing
Steve Zurier, Freelance WriterNews
'Project Springfield' debuts at Ignite conference.
By Steve Zurier Freelance Writer, 9/28/2016
Comment1 Comment  |  Read  |  Post a Comment
Hacking The Polls: Where US Voting Processes Fall Short
Jeff Schilling, Chief of Operations and Security, ArmorCommentary
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.
By Jeff Schilling Chief of Operations and Security, Armor, 9/28/2016
Comment5 comments  |  Read  |  Post a Comment
5 Best Practices For Winning the IoT Security Arms Race
Mark Benson & Brian Ericson, Exosite CTO & Software EngineerCommentary
By focusing on a pragmatic approach to security, its possible to develop IoT solutions that will reduce future risk without breaking the bank.
By Mark Benson, CTO, and Brian Ericson, , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 Security Vendors To Watch
Kelly Sheridan, Associate Editor, InformationWeek
A wave of security companies are armed with technologies to help businesses mitigate the next generation of cyberattacks. Who are these vendors and what can they offer?
By Kelly Sheridan Associate Editor, InformationWeek, 9/27/2016
Comment1 Comment  |  Read  |  Post a Comment
Yahoo Confirms August Data Dump Issue Unrelated To Breach Of 500 Million Users
Kelly Jackson Higgins, Executive Editor at Dark ReadingQuick Hits
No 'connection' between August 2016 data dump claims and 2014 nation-state attack, company says.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Yahoo Sued By User Over 2014 Hacking
Dark Reading Staff, Quick Hits
New Yorker files lawsuit against Yahoo for recklessness and delay in uncovering hack of half a billion accounts.
By Dark Reading Staff , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Yahoo Breach: US Senator Seeks SEC Role In Probe
Dark Reading Staff, Quick Hits
Democrat Mark Warner asks US Securities and Exchange Commission to investigate whether Yahoo completed obligations post breach discovery.
By Dark Reading Staff , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
7 New Rules For IoT Safety & Vuln Disclosure
Lysa Myers, Security Researcher, ESETCommentary
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!
By Lysa Myers Security Researcher, ESET, 9/24/2016
Comment0 comments  |  Read  |  Post a Comment
Spam Levels Spike, Thanks In Part To Ransomware
Sara Peters, Senior Editor at Dark ReadingNews
By shipping banking Trojans and ransomware that turn big profits fast, spammers can now afford the high overhead of high-volume spam campaigns.
By Sara Peters Senior Editor at Dark Reading, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
7 Ways Cloud Alters The Security Equation
Terry Sweeney, Contributing Editor
Would-be and existing customers must understand that security isn't set-and-forget just because it resides in the cloud.
By Terry Sweeney Contributing Editor, 9/23/2016
Comment1 Comment  |  Read  |  Post a Comment
D-FENSE! Using Research To Craft Effective Cyber Defenses
Dark Reading Staff, CommentaryVideo
A pair of experts from Imperva stops by the Dark Reading News Desk to chat.
By Dark Reading Staff , 9/23/2016
Comment1 Comment  |  Read  |  Post a Comment
On-Premises & In The Cloud: Making Sense Of Your Cybersecurity Ecosystem
Yishai Beeri, Director of Cybersecurity Research, CloudLockCommentary
As enterprises continue to invest in hybrid cloud strategies, they need their fragmented security solutions to work together.
By Yishai Beeri Director of Cybersecurity Research, CloudLock, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
FTC Releases Video With Data Breach Recovery Advice
Dark Reading Staff, Quick Hits
The US Federal Trade Commission video has detailed instructions on what to do if personal data of a user is stolen and exposed.
By Dark Reading Staff , 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
SWIFT CISO: Cyber Threat 'Persistent'
Dark Reading Staff, Quick Hits
Alain Desausoi describes threat as persistent, and says there's been progress in combating it via new SWIFT initiatives.
By Dark Reading Staff , 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
How Cloud, Mobile Are Changing IT, Security Management: Study
Kelly Sheridan, Associate Editor, InformationWeekNews
The evolution of technology is changing the role of IT and security pros as more employees use cloud apps and connect personal devices to corporate networks.
By Kelly Sheridan Associate Editor, InformationWeek, 9/21/2016
Comment1 Comment  |  Read  |  Post a Comment
Florida Man Charged With Hacking Linux Servers
Dark Reading Staff, Quick Hits
Donald Austin allegedly stole credentials of Linux employee to hack four company servers and install rootkit and Trojan software.
By Dark Reading Staff , 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
Why You May Need To Shake Up Your DevOps Team To Manage The Cloud
Mike Milner, Cofounder & CTO, IMMUNIOCommentary
The security approaches of yesterday wont work in the cloud world of today and tomorrow.
By Mike Milner, Immunio , 9/16/2016
Comment1 Comment  |  Read  |  Post a Comment
Yes, The Cloud Can Be A Security Win
Stan Black, CSO, CitrixCommentary
With the right controls in place, the cloud doesnt have to be a scary place. These guidelines can help your company stay safe.
By Stan Black CSO, Citrix, 9/15/2016
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.