News & Commentary
7 New Rules For IoT Safety & Vuln Disclosure
Lysa Myers, Security Researcher, ESETCommentary
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!
By Lysa Myers Security Researcher, ESET, 9/24/2016
Comment0 comments  |  Read  |  Post a Comment
Spam Levels Spike, Thanks In Part To Ransomware
Sara Peters, Senior Editor at Dark ReadingNews
By shipping banking Trojans and ransomware that turn big profits fast, spammers can now afford the high overhead of high-volume spam campaigns.
By Sara Peters Senior Editor at Dark Reading, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
7 Ways Cloud Alters The Security Equation
Terry Sweeney, Contributing Editor
Would-be and existing customers must understand that security isn't set-and-forget just because it resides in the cloud.
By Terry Sweeney Contributing Editor, 9/23/2016
Comment1 Comment  |  Read  |  Post a Comment
D-FENSE! Using Research To Craft Effective Cyber Defenses
Dark Reading Staff, CommentaryVideo
A pair of experts from Imperva stops by the Dark Reading News Desk to chat.
By Dark Reading Staff , 9/23/2016
Comment1 Comment  |  Read  |  Post a Comment
On-Premises & In The Cloud: Making Sense Of Your Cybersecurity Ecosystem
Yishai Beeri, Director of Cybersecurity Research, CloudLockCommentary
As enterprises continue to invest in hybrid cloud strategies, they need their fragmented security solutions to work together.
By Yishai Beeri Director of Cybersecurity Research, CloudLock, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
FTC Releases Video With Data Breach Recovery Advice
Dark Reading Staff, Quick Hits
The US Federal Trade Commission video has detailed instructions on what to do if personal data of a user is stolen and exposed.
By Dark Reading Staff , 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
SWIFT CISO: Cyber Threat 'Persistent'
Dark Reading Staff, Quick Hits
Alain Desausoi describes threat as persistent, and says there's been progress in combating it via new SWIFT initiatives.
By Dark Reading Staff , 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
How Cloud, Mobile Are Changing IT, Security Management: Study
Kelly Sheridan, Associate Editor, InformationWeekNews
The evolution of technology is changing the role of IT and security pros as more employees use cloud apps and connect personal devices to corporate networks.
By Kelly Sheridan Associate Editor, InformationWeek, 9/21/2016
Comment1 Comment  |  Read  |  Post a Comment
Florida Man Charged With Hacking Linux Servers
Dark Reading Staff, Quick Hits
Donald Austin allegedly stole credentials of Linux employee to hack four company servers and install rootkit and Trojan software.
By Dark Reading Staff , 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
Why You May Need To Shake Up Your DevOps Team To Manage The Cloud
Mike Milner, Cofounder & CTO, IMMUNIOCommentary
The security approaches of yesterday wont work in the cloud world of today and tomorrow.
By Mike Milner, Immunio , 9/16/2016
Comment1 Comment  |  Read  |  Post a Comment
Yes, The Cloud Can Be A Security Win
Stan Black, CSO, CitrixCommentary
With the right controls in place, the cloud doesnt have to be a scary place. These guidelines can help your company stay safe.
By Stan Black CSO, Citrix, 9/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Keep It Simple: Security For A Complex Enterprise
Dark Reading Staff, CommentaryVideo
Michelle Cobb of Skybox Security talks to Dark Reading about security management.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Wisdom From A Thought Leader: AppSec Best Practices
Dark Reading Staff, CommentaryVideo
The Black Hat News Desk chats with Jeff Williams, CTO at Contract Security.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Google, Facebook, Twitter, Petition Congress To Support ICANN Transition
Dark Reading Staff, Quick Hits
Google, Facebook, Twitter, Yahoo and other tech companies ask Congress to not oppose the scheduled October 1 transfer of Internet control to global community.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Don't Trust That Trust Mechanism: Vulnerabilities In Digital Certificates
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Tom Nipravsky, security researcher at Deep Instinct, explains how to tell the difference between a digital certificate that's worth your trust and one that isn't.
By Sara Peters Senior Editor at Dark Reading, 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Startup Focuses On Real-Time Security Monitoring Of Plant Networks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
With $32 million in venture capital funding and co-founders from Siemens and Israeli Defense Force research teams, Claroty emerges from stealth.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/13/2016
Comment0 comments  |  Read  |  Post a Comment
A Moving Target: Tackling Cloud Security As A Data Issue
Sheila B. Jordan, SVP & CIO, SymantecCommentary
Todays challenge is protecting critical information that an increasingly mobile workforce transfers every day between clouds, between cloud and mobile, and between cloud, mobile, and IoT.
By Sheila B. Jordan SVP & CIO, Symantec, 9/13/2016
Comment1 Comment  |  Read  |  Post a Comment
White House Names First Federal CISO
Dark Reading Staff, Quick Hits
Retired Brigadier General Touhill will serve as federal CISO.
By Dark Reading Staff , 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
Dan Kaminsky On How Not To Lose The Internet As We Know It
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Dan Kaminsky discusses how to improve the security and privacy of the Internet without destroying the openness and freedom to innovate that it has always provided.
By Sara Peters Senior Editor at Dark Reading, 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
Data Manipulation: An Imminent Threat
John Moynihan, President, Minuteman GovernanceCommentary
Critical industries are largely unprepared for a potential wave of destructive attacks.
By John Moynihan President, Minuteman Governance, 9/12/2016
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Joe Stanganelli
Current Conversations "What's this movie rated?"
In reply to: c
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.