Cloud
News & Commentary
Dailymotion Advises Password Change After Possible Data Breach
Dark Reading Staff, Quick Hits
Breach not yet confirmed, but LeakedSource says it has compromised IDs of over 87 million Dailymotion users, protected by bcrypt.
By Dark Reading Staff , 12/7/2016
Comment0 comments  |  Read  |  Post a Comment
Hacker Of Celeb Emails Goes To Jail For Five Years
Dark Reading Staff, Quick Hits
Bahamian Alonzo Knowles was sentenced for illegal access of 130 celebrity email accounts and selling their personal information.
By Dark Reading Staff , 12/7/2016
Comment2 comments  |  Read  |  Post a Comment
Cybersecurity Readiness Confidence Declined In 2016
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New report querying security pros shows increase in worry about risks with mobile and cloud environments.
By Ericka Chickowski Contributing Writer, Dark Reading, 12/5/2016
Comment1 Comment  |  Read  |  Post a Comment
Avalanche Botnet Comes Tumbling Down In Largest-Ever Sinkholing Operation
Sara Peters, Senior Editor at Dark ReadingNews
800,000 domains seized, sinkholed, or blocked, and five individuals arrested, in international effort to bring down botnet linked to 17 major malware families.
By Sara Peters Senior Editor at Dark Reading, 12/1/2016
Comment10 comments  |  Read  |  Post a Comment
Holiday Weekend Online Payment Card Fraud 20% Higher In 2016
Dark Reading Staff, Quick Hits
In the face of EMV chips, criminals turned online to commit card-not-present fraud this Black Friday and Cyber Monday.
By Dark Reading Staff , 12/1/2016
Comment1 Comment  |  Read  |  Post a Comment
20 Questions Smart Security Pros Should Ask About 'Intelligence'
Joshua Goldfarb, VP & CTO - Emerging Technologies, FireEyeCommentary
Threat intel is a hot but complicated topic that encompasses a lot more than just data feeds. Here's how to get beyond the fear, uncertainty, and doubt to maximize its potential.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 12/1/2016
Comment2 comments  |  Read  |  Post a Comment
The Rise Of SecBizOps & Why It Matters
Kevin O'Brien, Co-Founder and CEO, GreatHornCommentary
By aligning security dollars and technology with core business requirements, infosec can become a business enabler, not a business impediment.
By Kevin O'Brien Co-Founder and CEO, GreatHorn, 11/30/2016
Comment1 Comment  |  Read  |  Post a Comment
Job Loss And Financial Damage: CIOs Main Fears When Adopting Virtualization
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Companies arent prepared for the security challenges of hybrid infrastructures, Bitdefender study reveals.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 11/30/2016
Comment0 comments  |  Read  |  Post a Comment
2016's 7 Worst DDoS Attacks So Far
Sara Peters, Senior Editor at Dark Reading
Rise of booter and stresser services, mostly run on IoT botnets, is fueling DDoS excitement (but the pros aren't impressed).
By Sara Peters Senior Editor at Dark Reading, 11/28/2016
Comment3 comments  |  Read  |  Post a Comment
European Regulator Probes Yahoos 2015 Secret Email Scan
Dark Reading Staff, Quick Hits
Dublin-based Data Protection Commissioner trying to ascertain if Yahoo broke Europes privacy laws.
By Dark Reading Staff , 11/23/2016
Comment0 comments  |  Read  |  Post a Comment
Security Automation: Striking The Right Balance
Nathan Burke, VP, Marketing, HexaditeCommentary
What a smart toaster oven taught me about the importance of learning how to do a task versus the efficiency of automating the work.
By Nathan Burke VP, Marketing, Hexadite, 11/23/2016
Comment0 comments  |  Read  |  Post a Comment
Oracle Announces Acquisition Of Dyn
Dark Reading Staff, Quick Hits
Oracle says purchase of the recently DDoSed DNS service is aimed expanding the companys cloud computing platform.
By Dark Reading Staff , 11/22/2016
Comment1 Comment  |  Read  |  Post a Comment
Raising The Nation's Cybersecurity IQ: 'Learn To Code'
Mike Baukes, Co-Founder & Co-CEO, UpGuardCommentary
We need to ensure that the students of today are prepared for the security challenges of tomorrow.
By Mike Baukes Co-Founder & Co-CEO, UpGuard, 11/22/2016
Comment13 comments  |  Read  |  Post a Comment
Hackers Attack Canada Army Site, Redirect Visitors To China
Dark Reading Staff, Quick Hits
Canada armed forces take down recruitment site after would-be recruits are redirected to official Chinese government page.
By Dark Reading Staff , 11/21/2016
Comment0 comments  |  Read  |  Post a Comment
5 Ways Retailers Can Stay Safe Over the Holidays
Steve Zurier, Freelance Writer
E-commerce experts offer tips for locking down systems as the busy holiday season approaches.
By Steve Zurier Freelance Writer, 11/21/2016
Comment1 Comment  |  Read  |  Post a Comment
China's Jinping Opens Tech Meet With Calls For 'Fair & Equitable' Internet
Dark Reading Staff, Quick Hits
The third Wuzhen World Internet Conference had a strong presence of US tech companies despite criticism of Chinas Internet laws.
By Dark Reading Staff , 11/18/2016
Comment0 comments  |  Read  |  Post a Comment
Cloud-driven IT Decentralization Increases Security Risk
Kelly Sheridan, Associate Editor, InformationWeekNews
IT management has become increasingly decentralized, which many businesses think is causing more harm than good - especially for security, a new study says.
By Kelly Sheridan Associate Editor, InformationWeek, 11/17/2016
Comment0 comments  |  Read  |  Post a Comment
NIST Releases Version of Cybersecurity Framework for Small Businesses
Steve Zurier, Freelance WriterNews
Researchers offer a step-by-step approach for covering the basics of cybersecurity.
By Steve Zurier Freelance Writer, 11/17/2016
Comment0 comments  |  Read  |  Post a Comment
8 Public Sources Holding 'Private' Information
Sean Martin, CISSP | President, imsmartin
Personal information used for nefarious purposes can be found all over the web from genealogy sites to public records and social media.
By Sean Martin CISSP | President, imsmartin, 11/17/2016
Comment0 comments  |  Read  |  Post a Comment
'Snoopers Charter' Set To Become Law In UK
Dark Reading Staff, Quick Hits
Surveillance bill goes through British Parliament and awaits only the Royal assent to become law before the year ends.
By Dark Reading Staff , 11/17/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.