Customer Support

Dark Reading is published by UBM Tech, a division of UBM LLC.


UBM Tech
303 Second Street
South Tower, 9th floor, Suite 900
San Francisco, CA 94107
+1 415-947-6000

UBM LLC - US
600 Community Drive
Manhasset, NY 11030
516-562-5000
847-763-9588 - (outside the US)
847-763-9606 - Fax

Subscriptions & Customer Service:
Our Customer Service team is here to assist you with any questions or needs you may have. Send us a note at customerservice@informationweek.com and let us know how we can help.
• To sign up for a free Dark Reading digital subscription package visit Subscription Package
• To sign up for the Dark Reading newsletter please visit UBM Tech’s newsletter center newsletter sign-up
• To unsubscribe from a newsletter visit Newsletter Unsubscribe
• To change email address, email change
• If you wish to no longer receive any promotional emails from UBM Tech please click here, unsub@ubm.com.

Report a site issue
If you encounter a problem while using our site please contact us via email at support@darkreading.com. Please include as much of the following information as you can:
• A short description of the problem along with the URL and screenshot
• Your current operation system, browser & version. If on mobile device, please specify device and model

Reprints:
For information about reprints and copyright permissions, please contact Wright's Media:
Joe Hull, Wright's Media, Phone: (281) 419.5725 ext.106 , Wright's Media

General business:
John Ecke, VP and Group Brand Director, john.ecke@ubm.com 212-600-3097

Editorial feedback/ inquiries:
Tim Wilson, Editor-in-Chief, Dark Reading, timothy.wilson@ubm.com (703) 262-0680 or Kelly Jackson Higgins, Senior Editor, Dark Reading kelly.jackson.higgins@ubm.com (434) 960-9899

 

Sales & marketing inquiries:
http://createyournextcustomer.techweb.com/contact-us/biz-tech-contacts/

Media kit: http://createyournextcustomer.techweb

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

CVE-2015-2922
Published: 2015-05-27
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.