Dark Reading Radio: Data Loss Prevention (DLP) Fail
7 Black Hat Sessions Sure To Cause A Stir
Myth-Busting Machine Learning In Security
DHS-Funded 'SWAMP' Helps Scour Code For Bugs
Infographic: With BYOD, Mobile Is The New Desktop
News & Commentary
'Backoff' Malware: Time To Step Up Remote Access Security
Boatner Blankenstein, Senior Director, Solutions Engineering, BomgarCommentary
DHS issues advisory about remote desktop access tools associated with recent point-of-sale breaches.
By Boatner Blankenstein Senior Director, Solutions Engineering, Bomgar, 8/1/2014
Comment3 comments  |  Read  |  Post a Comment
LIVE From Las Vegas: Dark Reading Radio at Black Hat
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
If you can't physically be at Black Hat USA 2014, Dark Reading offers a virtual alternative where you can engage with presenters and attendees about hot show topics and trends.
By Marilyn Cohodas Community Editor, Dark Reading, 8/1/2014
Comment0 comments  |  Read  |  Post a Comment
Some Security Tools Fail With Multipath TCP
Brian Prince, Contributing Writer, Dark ReadingNews
Researchers at Black Hat USA will reveal how multipath TCP breaks assumptions about how TCP works -- and the implications for network security.
By Brian Prince Contributing Writer, Dark Reading, 8/1/2014
Comment1 Comment  |  Read  |  Post a Comment
'Energetic' Bear Under The Microscope
Kelly Jackson Higgins, Senior Editor, Dark ReadingQuick Hits
Kaspersky Lab report finds more industries hit by the infamous cyber espionage campaign -- and evidence pointing to French and Swedish-speaking attackers as well as Eastern European ones.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/31/2014
Comment6 comments  |  Read  |  Post a Comment
USB Hardware Easily Subverted, Researchers Claim
Thomas Claburn, Editor-at-LargeCommentary
Security researchers say they can reprogram USB controller chips to hijack USB devices and connected computers.
By Thomas Claburn Editor-at-Large, 7/31/2014
Comment13 comments  |  Read  |  Post a Comment
InfoSec’s Holy Grail: Data Sharing & Collaboration
Levi Gundert, Technical Lead, Cisco Threat Research, Analysis, and Communications (TRAC)Commentary
Despite all the best intentions, cooperation around Internet security is still a work in progress. Case in point: Microsoft’s unilateral action against No-IP.
By Levi Gundert Technical Lead, Cisco Threat Research, Analysis, and Communications (TRAC), 7/31/2014
Comment0 comments  |  Read  |  Post a Comment
10 Dramatic Moments In Black Hat History
Ericka Chickowski, Contributing Writer, Dark Reading
From Google hacking to ATM "jackpotting" to the NSA -- Black Hat has had some memorable moments over the years.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/31/2014
Comment4 comments  |  Read  |  Post a Comment
New Mobile Phone '0wnage' Threat Discovered
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
Widespread major vulnerabilities discovered in client control software that affect nearly all smartphone platforms: Details to come at Black Hat USA next week.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/31/2014
Comment6 comments  |  Read  |  Post a Comment
Phishing: What Once Was Old Is New Again
Dave Kearns, Analyst, Kuppinger-ColeCommentary
I used to think the heyday of phishing had passed. But as Symantec notes in its 2014 Internet Security Threat Report, I was wrong!
By Dave Kearns Analyst, Kuppinger-Cole, 7/30/2014
Comment11 comments  |  Read  |  Post a Comment
Security Holes Found In Some DLP Products
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
Researchers to reveal key security flaws in commercial and open-source data loss prevention software at Black Hat USA next week.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/30/2014
Comment3 comments  |  Read  |  Post a Comment
Dark Reading Radio: Data Loss Prevention (DLP) Fail
Kelly Jackson Higgins, Senior Editor, Dark ReadingCommentary
Learn about newly found vulnerabilities in commercial and open-source DLP software in our latest episode of Dark Reading Radio with security researchers Zach Lanier and Kelly Lum.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/29/2014
Comment8 comments  |  Read  |  Post a Comment
Scan Shows Possible Heartbleed Fix Failures
Kelly Jackson Higgins, Senior Editor, Dark ReadingQuick Hits
Study indicates many Global 2000 firms patched, but failed to replace digital certificates.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/29/2014
Comment5 comments  |  Read  |  Post a Comment
The Perfect InfoSec Mindset: Paranoia + Skepticism
Corey Nachreiner, Director, Security Strategy & Research, WatchGuard TechnologiesCommentary
A little skeptical paranoia will ensure that you have the impulse to react quickly to new threats while retaining the logic to separate fact from fiction.
By Corey Nachreiner Director, Security Strategy & Research, WatchGuard Technologies, 7/29/2014
Comment11 comments  |  Read  |  Post a Comment
Internet Of Things Contains Average Of 25 Vulnerabilities Per Device
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New study finds high volume of security flaws in such IoT devices as webcams, home thermostats, remote power outlets, sprinkler controllers, home alarms, and garage door openers.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/29/2014
Comment6 comments  |  Read  |  Post a Comment
DHS-Funded 'SWAMP' Helps Scour Code For Bugs
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
Cloud-based platform offering free secure coding tools for developers in government, enterprises, academia, gaining commercial attention as well.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/28/2014
Comment5 comments  |  Read  |  Post a Comment
Weak Password Advice From Microsoft
Andrey Dulkin, Senior Director, Cyber Innovation, CyberArkCommentary
Tempting as it may seem to do away with strong passwords for low-risk websites, password reuse is still a significant threat to both users and business.
By Andrey Dulkin Senior Director, Cyber Innovation, CyberArk, 7/28/2014
Comment9 comments  |  Read  |  Post a Comment
Myth-Busting Machine Learning In Security
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat USA presentation to help quell misconceptions and confusion over machine learning methods in today's security tools.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/28/2014
Comment4 comments  |  Read  |  Post a Comment
Researchers Develop 'BlackForest' To Collect, Correlate Threat Intelligence
Brian Prince, Contributing Writer, Dark ReadingNews
Researchers at the Georgia Tech Research Institute develop the BlackForest system to help organizations uncover and anticipate cyberthreats.
By Brian Prince Contributing Writer, Dark Reading, 7/25/2014
Comment2 comments  |  Read  |  Post a Comment
Internet of Things: 4 Security Tips From The Military
Michael K. Daly, CTO, Cybersecurity & Special Missions, Raytheon Intelligence, Information & ServicesCommentary
The military has been connecting mobile command posts, unmanned vehicles, and wearable computers for decades. It’s time to take a page from their battle plan.
By Michael K. Daly CTO, Cybersecurity & Special Missions, Raytheon Intelligence, Information & Services, 7/25/2014
Comment13 comments  |  Read  |  Post a Comment
Travel Agency Fined £150,000 For Violating Data Protection Act
Sara Peters, News
That'll teach them not to retain credit card data in perpetuity.
By Sara Peters , 7/24/2014
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Security Insights
Microsoft, No-IP, And The Need For Clarity
Microsoft, No-IP, And The Need For Clarity
The Microsoft vs. No-IP case highlights the need for clear standards of abuse handling and transparency on which service providers measure up.
Comment0 comments
Read | Post a Comment
More Sophos Security Insights
PR Newswire
Hello. We were unable to find the address you requested. You may search for the content you are seeking using our search form or email technical support with any questions.
The Perfect InfoSec Mindset: Paranoia + Skepticism
Corey Nachreiner, Director, Security Strategy & Research, WatchGuard Technologies,  7/29/2014
Phishing: What Once Was Old Is New Again
Dave Kearns, Analyst, Kuppinger-Cole,  7/30/2014
Weak Password Advice From Microsoft
Andrey Dulkin, Senior Director, Cyber Innovation, CyberArk,  7/28/2014
Register for Dark Reading Newsletters
Dark Reading Radio
Flash Poll
White Papers
Current Issue
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Cartoon