Endpoint

News & Commentary
ATM Machine Malware Sold on Dark Web
Dark Reading Staff, Quick Hits
Cybercriminals are advertising ATM malware that's designed to exploit hardware and software vulnerabilities on the cash-dispensing machines.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Google Bolsters Security for Select Groups
Dark Reading Staff, Quick Hits
Business leaders, political campaign teams, journalists, and other high-risk groups will receive advanced email and account protection.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
US Supreme Court to Hear Microsoft-DOJ Email Case
Dark Reading Staff, Quick Hits
High court to rule on email privacy case, pitting Redmond giant against DOJ over access to its foreign-based email servers.
By Dark Reading Staff , 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
DHS to Require All Fed Agencies to Use DMARC, HTTPS, and STARTTLS
Dawn Kawamoto, Associate Editor, Dark ReadingNews
The move follows a DHS review of federal government agencies' steps to secure email and deploy authentication technologies.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
Adobe Patches Flash ZeroDay Used To Plant Surveillance Software
Dark Reading Staff, Quick Hits
Second time in four weeks FINSPY "lawful intercept" tool and a zero-day found together.
By Dark Reading Staff , 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
GDPR Compliance: 5 Early Steps to Get Laggards Going
Sara Peters, Senior Editor at Dark Reading
If you're just getting on the EU General Data Protection Regulation bandwagon, here's where you should begin.
By Sara Peters Senior Editor at Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRACommentary
As cybersecurity continues to become more of a mainstream concern, those of us who speak at industry events must learn how to truly connect with our audience.
By Joshua Goldfarb Co-founder & Chief Product Officer, IDDRA, 10/16/2017
Comment2 comments  |  Read  |  Post a Comment
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark ReadingNews
Organizations frequently overlook printer security, leaving systems exposed to malware and theft. New tools aim to lessen the risk.
By Kelly Sheridan Associate Editor, Dark Reading, 10/16/2017
Comment2 comments  |  Read  |  Post a Comment
Kaspersky Lab and the AV Security Hole
Jai Vijayan, Freelance writerNews
It's unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor's network, security experts say.
By Jai Vijayan Freelance writer, 10/12/2017
Comment1 Comment  |  Read  |  Post a Comment
Olympic Games Face Greater Cybersecurity Risks
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Cybercriminals may alter score results and engage in launching physical attacks at future Olympic Games, a recently released report warns.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO AdvisorCommentary
With social media, gathering information has never been easier, making Business Email Compromise the land of milk and honey for cybercriminals.
By Marc Wilczek Digital Strategist & CIO Advisor, 10/12/2017
Comment2 comments  |  Read  |  Post a Comment
IoT: Insecurity of Things or Internet of Threats?
Kelly Sheridan, Associate Editor, Dark ReadingNews
Security leaders call for device manufacturers to buckle down on device security as the Internet of Things evolves.
By Kelly Sheridan Associate Editor, Dark Reading, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
Phishing Emails that Invoke Fear, Urgency, Get the Most Clicks
Kelly Sheridan, Associate Editor, Dark ReadingNews
The most commonly clicked phishing emails include urgent calls to action, or exploit victims' desire for popularity.
By Kelly Sheridan Associate Editor, Dark Reading, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
How Systematic Lying Can Improve Your Security
Lance Cottrell, Chief Scientist, NtrepidCommentary
No, you don't have to tell websites your mother's actual maiden name.
By Lance Cottrell Chief Scientist, Ntrepid, 10/11/2017
Comment3 comments  |  Read  |  Post a Comment
Security Tops Use Cases for Endpoint Data
Dark Reading Staff, Quick Hits
Businesses increasingly use endpoint data for security investigations, eDiscovery, and device migration to Windows 10.
By Dark Reading Staff , 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
Ransomware Sales on the Dark Web Spike 2,502% in 2017
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Sales soar to $6.2 million as do-it-yourself kits, ransomware-as-a-service, and distribution offerings take hold.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/11/2017
Comment1 Comment  |  Read  |  Post a Comment
GDPR Concerns Include 'Where's My Data Stored?'
Ericka Chickowski, Contributing Writer, Dark ReadingNews
European data protection regulations are coming like a freight train and many firms are still unprepared.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
Microsoft Patches Windows Zero-Day Flaws Tied to DNSSEC
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Security experts advise 'immediate' patching of critical DNS client vulnerabilities in Windows 8, 10, and other affected systems.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/10/2017
Comment1 Comment  |  Read  |  Post a Comment
Unstructured Data: The Threat You Cannot See
Charles Fullwood, Software Practice Director at Force 3Commentary
Why security teams needs to take a cognitive approach to the increasing volumes of data flowing from sources they don't control.
By Charles Fullwood Software Practice Director at Force 3, 10/10/2017
Comment0 comments  |  Read  |  Post a Comment
Key New Security Features in Android Oreo
Dawn Kawamoto, Associate Editor, Dark Reading
Android 8.0 Oreo marks a major revamp of Google's mobile operating system, putting in a number of new security-hardening measures.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/10/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by AlyssaTallent
Current Conversations Ohhh that is pretty interesting 
In reply to: Great
Post Your Own Reply
More Conversations
PR Newswire
Cybersecurity's 'Broken' Hiring Process
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/11/2017
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What did you expect from this SOC? A unicorn....
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.