CEO Report Card: Low Grades for Risk Management
Dark Reading Radio: Where Do Security Startups Come From?
6 Things That Stink About SSL
Payment Card Data Theft: Tips For Small Business
A New Age in Cyber Security: Public Cyberhealth
News & Commentary
7 Black Hat Sessions Sure To Cause A Stir
Ericka Chickowski, Contributing Writer, Dark Reading
At Black Hat, researchers will point out the weaknesses in everything from the satellites in outer space to the thermostat in your home.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/22/2014
Comment0 comments  |  Read  |  Post a Comment
Nigerian 419 Scammers Evolving Into Malware Pushers (But Not Very Good Ones)
Sara Peters, Quick Hits
"Silver Spaniel" attacks use commodity malware to damage others' security, but they aren't very good at protecting their own.
By Sara Peters , 7/22/2014
Comment0 comments  |  Read  |  Post a Comment
Infographic: With BYOD, Mobile Is The New Desktop
Adam Ely, COO, BlueboxCommentary
Security teams have no choice but to embrace the rapid proliferation of BYO devices, apps, and cloud services. To ignore it is to put your head in the sand.
By Adam Ely COO, Bluebox, 7/22/2014
Comment1 Comment  |  Read  |  Post a Comment
Black Hat Speaker: Don't Overestimate EMV Protections, Underestimate Card Thief Sophistication
Ericka Chickowski, Contributing Writer, Dark ReadingNews
AccessData researcher will offer up crash course in card payment tech and protections to root out security community misconceptions
By Ericka Chickowski Contributing Writer, Dark Reading, 7/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Internet of Things: Security For A World Of Ubiquitous Computing
Candace Worley, SVP & GM, Endpoint Security, McAfeeCommentary
Endpoint security is hardly dead, and claiming that it is oversimplifies the challenges corporations face now and in the not-very-distant future.
By Candace Worley SVP & GM, Endpoint Security, McAfee, 7/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Hacking Your Hotel Room
Brian Prince, Contributing Writer, Dark ReadingNews
At Black Hat USA next month, a researcher will show how to hack your way into controlling everything in a hotel room -- from lighting to television sets.
By Brian Prince Contributing Writer, Dark Reading, 7/18/2014
Comment11 comments  |  Read  |  Post a Comment
CEO Report Card: Low Grades for Risk Management
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Dark Reading's latest community poll shows a stunning lack of confidence in chief execs' commitment to cyber security.
By Marilyn Cohodas Community Editor, Dark Reading, 7/18/2014
Comment12 comments  |  Read  |  Post a Comment
Government-Grade Stealth Malware In Hands Of Criminals
Sara Peters, News
"Gyges" can be bolted onto other malware to hide it from anti-virus, intrusion detection systems, and other security tools.
By Sara Peters , 7/17/2014
Comment12 comments  |  Read  |  Post a Comment
Website Hacks Dropped During World Cup Final
Kelly Jackson Higgins, Senior Editor, Dark ReadingQuick Hits
Hackers apparently took time off to watch the Germany-Argentina title match of the 2014 FIFA World Cup.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/17/2014
Comment14 comments  |  Read  |  Post a Comment
A New Age in Cyber Security: Public Cyberhealth
Brian Foster, CTO, DamballaCommentary
The cleanup aimed at disrupting GameOver Zeus and CryptoLocker offers an instructive template for managing mass cyber infections.
By Brian Foster CTO, Damballa, 7/17/2014
Comment5 comments  |  Read  |  Post a Comment
Ransomware: 5 Threats To Watch
Kelly Jackson Higgins, Senior Editor, Dark Reading
Cyber criminals have kicked it up a notch with nasty malware that locks you out of your machine and holds it for ransom.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/17/2014
Comment5 comments  |  Read  |  Post a Comment
Senate Hearing Calls for Changes to Cybercrime Law
Sara Peters, News
In the wake of Microsoft's seizure of No-IP servers and domains, private and public sector representatives met to discuss what can be done to address the problem of botnets.
By Sara Peters , 7/16/2014
Comment10 comments  |  Read  |  Post a Comment
Passwords & The Future Of Identity: Payment Networks?
Andre Boysen, EVP, Digital Identity Evangelist, SecureKeyCommentary
The solution to the omnipresent and enduring password problem may be closer than you think.
By Andre Boysen EVP, Digital Identity Evangelist, SecureKey, 7/16/2014
Comment17 comments  |  Read  |  Post a Comment
Automobile Industry Accelerates Into Security
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
Industry looking at intelligence-sharing platform or an Auto-ISAC in anticipation of more automated, connected -- and vulnerable -- vehicles.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/15/2014
Comment13 comments  |  Read  |  Post a Comment
Payment Card Data Theft: Tips For Small Business
Chris Nutt, Director, Incident Response & Malware, MandiantCommentary
For small businesses looking to reduce their exposure to data theft the good news is the advantage of being small.
By Chris Nutt Director, Incident Response & Malware, Mandiant, 7/15/2014
Comment7 comments  |  Read  |  Post a Comment
Tapping Into A Homemade Android Army
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat speaker will detail how security researchers can expedite their work across numerous Android devices at once.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/15/2014
Comment2 comments  |  Read  |  Post a Comment
Active Directory Flaw Lets Attackers Change Passwords
Sara Peters, Quick Hits
Aorato finds way to compromise Active Directory and change passwords without being noticed by SIEM.
By Sara Peters , 7/15/2014
Comment11 comments  |  Read  |  Post a Comment
Google Forms Zero-Day Hacking Team
Kelly Jackson Higgins, Senior Editor, Dark ReadingQuick Hits
'Project Zero' to hunt bugs in all software that touches the Net.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/15/2014
Comment3 comments  |  Read  |  Post a Comment
Dark Reading Radio: Where Do Security Startups Come From?
Tim Wilson, Editor in Chief, Dark ReadingCommentary
This week's radio broadcast will discuss how hot new security companies are born and how they are funded. Showtime is 1:00 p.m. ET.
By Tim Wilson Editor in Chief, Dark Reading, 7/15/2014
Comment2 comments  |  Read  |  Post a Comment
DropCam Vulnerable To Hijacking
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
Researchers at DEF CON to demonstrate flaws in a popular WiFi video monitoring system.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 7/14/2014
Comment8 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Security Insights
Microsoft, No-IP, And The Need For Clarity
Microsoft, No-IP, And The Need For Clarity
The Microsoft vs. No-IP case highlights the need for clear standards of abuse handling and transparency on which service providers measure up.
Comment0 comments
Read | Post a Comment
More Sophos Security Insights
PR Newswire
Hello. We were unable to find the address you requested. You may search for the content you are seeking using our search form or email technical support with any questions.
Passwords & The Future Of Identity: Payment Networks?
Andre Boysen, EVP, Digital Identity Evangelist, SecureKey,  7/16/2014
Website Hacks Dropped During World Cup Final
Kelly Jackson Higgins, Senior Editor, Dark Reading,  7/17/2014
Register for Dark Reading Newsletters
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.
Flash Poll
White Papers
Current Issue
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Cartoon