News & Commentary
The Hidden Dangers Of 'Bring Your Own Body'
Kon Leong, CEO/Co-founder, ZL TechnologiesCommentary
The use of biometric data is on the rise, causing new security risks that must be assessed and addressed.
By Kon Leong CEO/Co-founder, ZL Technologies, 8/26/2016
Comment0 comments  |  Read  |  Post a Comment
When Securing Your Applications, Seeing Is Believing
Mike Convertino, CISO & VP, Information Security, F5 NetworksCommentary
While the cloud is amazing, a worrying lack of visibility goes along with it. Keep that in mind as you develop your security approach.
By Mike Convertino CISO & VP, Information Security, F5 Networks, 8/24/2016
Comment1 Comment  |  Read  |  Post a Comment
CISO Security Portfolios Vs. Reporting Structures
Adam Shostack, Founder, Stealth StartupCommentary
Organizational structure is a tool for driving action. Worrying about your bosss title wont help you as much as a better communication framework.
By Adam Shostack Founder, Stealth Startup, 8/23/2016
Comment0 comments  |  Read  |  Post a Comment
Hacktivists Take Aim At Olympics Broadcast Service
Dark Reading Staff, Quick Hits
Broadcasts and images of Games left intact, but employee contact information apparently breached.
By Dark Reading Staff , 8/22/2016
Comment1 Comment  |  Read  |  Post a Comment
Darknet: Where Your Stolen Identity Goes to Live
Itay Glick, CEO & Co-founder, VotiroCommentary
Almost everything is available on the Darknet -- drugs, weapons, and child pornography -- but where it really excels is as an educational channel for beginning identity thieves.
By Itay Glick CEO & Co-founder, Votiro, 8/19/2016
Comment1 Comment  |  Read  |  Post a Comment
FireEye Probes Suspected Breach Of Clinton Charity Site: Sources
Dark Reading Staff, Quick Hits
Officials say attackers reportedly employed same technique as used in Russia-backed hacking of Democratic Party groups.
By Dark Reading Staff , 8/19/2016
Comment0 comments  |  Read  |  Post a Comment
5 Strategies For Enhancing Targeted Security Monitoring
Jason Sachowski, Director, Security Forensics & Civil Investigations, Scotiabank GroupCommentary
These examples will help you improve early incident detection results.
By Jason Sachowski Director, Security Forensics & Civil Investigations, Scotiabank Group, 8/18/2016
Comment0 comments  |  Read  |  Post a Comment
User Ed: Patching People Vs Vulns
Lysa Myers, Security Researcher, ESETCommentary
How infosec can combine and adapt security education and security defenses to the way users actually do their jobs.
By Lysa Myers Security Researcher, ESET, 8/17/2016
Comment0 comments  |  Read  |  Post a Comment
Security Must Become Driving Force For Auto Industry
Art Dahnert, Managing Consultant, Cigital, Inc.Commentary
Digital security hasnt kept pace in this always-connected era. Is infosec up to the challenge?
By Art Dahnert Managing Consultant, Cigital, Inc., 8/17/2016
Comment0 comments  |  Read  |  Post a Comment
Poorly Configured DNSSEC = Potential DDoS Weapon
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New research from Neustar shows how attackers could abuse DNSSEC-secured domains for distributed denial-of-service (DDoS) attacks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/16/2016
Comment0 comments  |  Read  |  Post a Comment
Dark Reading Radio: What Keeps IT Security Pros Awake at Night
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Join us for a wide-ranging discussion with (ISC) Chief Exec David Shearer on the most worrisome infosec trends and challenges.
By Marilyn Cohodas Community Editor, Dark Reading, 8/16/2016
Comment0 comments  |  Read  |  Post a Comment
DDoS Attack On Aussie Swimming Site Linked To Horton-Sun Yang Feud
Dark Reading Staff, Quick Hits
Cyberattack soon after Australian swimmer accuses Chinese rival of being a drug cheat.'
By Dark Reading Staff , 8/15/2016
Comment0 comments  |  Read  |  Post a Comment
6 Things To Know For Securing Amazon Web Services
Steve Zurier, Freelance Writer
AWS is coming out with more new cloud security features.
By Steve Zurier Freelance Writer, 8/13/2016
Comment0 comments  |  Read  |  Post a Comment
Trouble In the Cloud: More Than Half Of Organizations Facing Security Woes
Rutrell Yasin, Business Technology Writer, Tech Writers BureauNews
Survey shows security professionals are grappling with unauthorized data sharing and other security incidents in SaaS cloud environments.
By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 8/12/2016
Comment0 comments  |  Read  |  Post a Comment
Global Businesses Ask China To Revise Draft Cyber Rules
Dark Reading Staff, Quick Hits
Security may weaken, economic growth hampered, if draft made into law, say 46 businesses in letter to Li Keqiang.
By Dark Reading Staff , 8/12/2016
Comment1 Comment  |  Read  |  Post a Comment
Substantially Above Par: DR Cartoon Caption Contest Winners
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Critical vulnerabilities, links & virtual reality. And the winner is...
By Marilyn Cohodas Community Editor, Dark Reading, 8/12/2016
Comment0 comments  |  Read  |  Post a Comment
The Future Of ATM Hacking
Sara Peters, Senior Editor at Dark ReadingNews
Research released at Black Hat USA last week shows that one of our best defenses for the future of payment card and ATM security isn't infallible. Here's why.
By Sara Peters Senior Editor at Dark Reading, 8/11/2016
Comment3 comments  |  Read  |  Post a Comment
Bitcoins Forfeited In Silk Road Cases To Be Auctioned
Dark Reading Staff, Quick Hits
US Marshals Service to sell 2,719 bitcoins worth around $1.6 million on August 22 -- bidders must register by August 18.
By Dark Reading Staff , 8/9/2016
Comment0 comments  |  Read  |  Post a Comment
Newly Announced Chipset Vuln Affects 900 Million Android Devices
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Check Point Research Team details four vulnerabilities that can easily lead to full privilege escalation.
By Ericka Chickowski Contributing Writer, Dark Reading, 8/8/2016
Comment0 comments  |  Read  |  Post a Comment
Data Protection From The Inside Out
Dan Frank, Deloitte Advisory Principal, Cyber Risk ServicesCommentary
Organizations must make fundamental changes in the way they approach data protection.
By Dan Frank Deloitte Advisory Principal, Cyber Risk Services, 8/8/2016
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas and her guest, David Shearer, (ISC)2 Chief Executive Officer, as they discuss issues that keep IT security professionals up at night, including results from the recent 2016 Black Hat Attendee Survey.