Endpoint
News & Commentary
6 Ways To Prepare For The EUs GDPR
Jai Vijayan, Freelance writerNews
In less than 20 months, all US companies doing business in the EU will face new consumer privacy requirements. Heres how to prepare for them.
By Jai Vijayan Freelance writer, 9/30/2016
Comment0 comments  |  Read  |  Post a Comment
Today's Cybersecurity Management Requires A New Approach
Samuel Visner & Beth Musumeci,  Senior VP, General Manager & Senior VP, ICF Commercial Cybersecurity Practice Commentary
The current managed security services provider model just doesn't work in our information-rich world. Time to shake things up.
By Samuel Visner & Beth Musumeci Senior VP, General Manager & Senior VP, ICF Commercial Cybersecurity Practice , 9/30/2016
Comment1 Comment  |  Read  |  Post a Comment
EMV: The Anniversary Of One Deadline, The Eve of Another
Sara Peters, Senior Editor at Dark ReadingNews
How merchants and criminals responded since the EMV liability shift for point-of-sale devices one year ago. And what changes can we expect after the liability shift for ATMs, which is just days away?
By Sara Peters Senior Editor at Dark Reading, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Fear & Loathing In The Cloud
Tim Prendergast, Founder & CEO, Evident.ioCommentary
Whether you've already bought your ticket for the cloud or still have some issues to sort through, fine-tune your security practices to make sure your ride is a smooth one.
By Tim Prendergast Founder & CEO, Evident.io, 9/29/2016
Comment2 comments  |  Read  |  Post a Comment
Russian Hackers Target Citizen Journalists Reporting On Malaysian Airlines Crash
Jai Vijayan, Freelance writerNews
Bellingcats reporters have been hit with spear phishing attacks and account takeover attempts for over a year, ThreatConnect says.
By Jai Vijayan Freelance writer, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
The Real Reasons Why Users Stink At Passwords
Terry Sweeney, Contributing EditorNews
Personality, denial, and authentication-overload are big factors, new study finds.
By Terry Sweeney Contributing Editor, 9/28/2016
Comment14 comments  |  Read  |  Post a Comment
Hacking The Polls: Where US Voting Processes Fall Short
Jeff Schilling, Chief of Operations and Security, ArmorCommentary
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.
By Jeff Schilling Chief of Operations and Security, Armor, 9/28/2016
Comment5 comments  |  Read  |  Post a Comment
FBI Probes Bid To Hack Democratic Party Officials Phones, Sources Say
Dark Reading Staff, Quick Hits
Russia-backed criminals again likely to be behind this hacking which, if proven, could involve theft of sensitive data, say the sources.
By Dark Reading Staff , 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
5 Best Practices For Winning the IoT Security Arms Race
Mark Benson & Brian Ericson, Exosite CTO & Software EngineerCommentary
By focusing on a pragmatic approach to security, its possible to develop IoT solutions that will reduce future risk without breaking the bank.
By Mark Benson, CTO, and Brian Ericson, , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Mobile Fraud Changes Outlook for Multifactor Authentication
Stephen Maloney, Executive VP, Business Development & Strategy, AcuantCommentary
SMS one-time passcodes just won't cut it anymore. We need new approaches that people will actually use.
By Steve Maloney , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
What The WADA Hack Proves About Today's Threat Landscape
Gary Newe, Director of Systems Engineering, F5 NetworksCommentary
Fancy Bear's initial release of data on four top American athletes reminds us all to reassess our risks.
By Gary Newe , 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
Adware Campaign Using Advanced Nation-State Obfuscation Techniques
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New report from Carbon Black shows adware may be spreading ransomware, using similar tactics as Operation Aurora.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
7 New Rules For IoT Safety & Vuln Disclosure
Lysa Myers, Security Researcher, ESETCommentary
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!
By Lysa Myers Security Researcher, ESET, 9/24/2016
Comment0 comments  |  Read  |  Post a Comment
Biometric Skimmers Pose Emerging Threat To ATMs
Jai Vijayan, Freelance writerNews
Even as financial institutions move to shore up ATM security with biometric mechanisms, cybercrooks are busy figuring out ways to beat them.
By Jai Vijayan Freelance writer, 9/22/2016
Comment1 Comment  |  Read  |  Post a Comment
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Will Ackerly, Co-Founder & CTO, VirtruCommentary
Oliver Stones movie shows us that while most of us have nothing to hide, we all have information worth protecting both technically and constitutionally.
By Will Ackerly Co-Founder & CTO, Virtru, 9/22/2016
Comment12 comments  |  Read  |  Post a Comment
Even A False Positive Can Be Valuable
Mark Clancy, CEO, SoltraCommentary
Sharing information about cyberthreats is important for the financial services industry, even when threats turn out to be not-so-threatening.
By Mark Clancy CEO, Soltra, 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
Majority Of Major Corporations Have User Credentials Stolen And Exposed
Jai Vijayan, Freelance writerNews
Companies in the entertainment and technology sectors are far more exposed than others, Digital Shadows analysis shows.
By Jai Vijayan Freelance writer, 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack
Marc Laliberte, Information Security Threat Analyst, WatchGuard TechnologiesCommentary
This slightly modified model is a practical way to keep attackers out of your systems.
By Marc Laliberte Information Security Threat Analyst, WatchGuard Technologies, 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
Rand Study: Average Data Breach Costs $200K, Not Millions
Terry Sweeney, Contributing EditorNews
Rand taps multiple data sources to calculate that cyber incidents cost firms a scant 0.4% of annual revenues, on average.
By Terry Sweeney Contributing Editor, 9/21/2016
Comment2 comments  |  Read  |  Post a Comment
Smartphone Infections Rise 96% In H1-2016: Malware Study
Dark Reading Staff, Quick Hits
Nokia report reveals April 2016 saw new all-time high in mobile infections with one out of every 120 smartphone affected.
By Dark Reading Staff , 9/20/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.