Customer Support

Dark Reading is published by UBM Tech, a division of UBM LLC.


UBM Tech
303 Second Street
South Tower, 9th floor, Suite 900
San Francisco, CA 94107
+1 415-947-6000

UBM LLC - US
600 Community Drive
Manhasset, NY 11030
516-562-5000
847-763-9588 - (outside the US)
847-763-9606 - Fax

Subscriptions & Customer Service:
Our Customer Service team is here to assist you with any questions or needs you may have. Send us a note at [email protected] and let us know how we can help.
• To sign up for a free Dark Reading digital subscription package visit Subscription Package
• To sign up for the Dark Reading newsletter please visit UBM Tech’s newsletter center newsletter sign-up
• To unsubscribe from a newsletter visit Newsletter Unsubscribe
• To change email address, email change
• If you wish to no longer receive any promotional emails from UBM Tech please click here, [email protected].

Report a site issue
If you encounter a problem while using our site please contact us via email at [email protected]. Please include as much of the following information as you can:
• A short description of the problem along with the URL and screenshot
• Your current operation system, browser & version. If on mobile device, please specify device and model

Reprints:
For information about reprints and copyright permissions, please contact Wright's Media:
Joe Hull, Wright's Media, Phone: (281) 419.5725 ext.106 , Wright's Media

General business:
John Ecke, VP and Group Brand Director, [email protected] 212-600-3097

Editorial feedback/ inquiries:
Tim Wilson, Editor-in-Chief, Dark Reading, [email protected] (703) 262-0680 or Kelly Jackson Higgins, Senior Editor, Dark Reading [email protected] (434) 960-9899

 

Sales & marketing inquiries:
http://createyournextcustomer.techweb.com/contact-us/biz-tech-contacts/

Media kit: http://createyournextcustomer.techweb

Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How To Build An Effective Defense Against Ransomware
A compendium of Dark Reading´s best recent coverage of ransomware attacks, as well as best practices for defending your enterprise against them.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers