Operations // Identity & Access Management
News & Commentary
7 New Rules For IoT Safety & Vuln Disclosure
Lysa Myers, Security Researcher, ESETCommentary
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!
By Lysa Myers Security Researcher, ESET, 9/24/2016
Comment0 comments  |  Read  |  Post a Comment
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Will Ackerly, Co-Founder & CTO, VirtruCommentary
Oliver Stones movie shows us that while most of us have nothing to hide, we all have information worth protecting both technically and constitutionally.
By Will Ackerly Co-Founder & CTO, Virtru, 9/22/2016
Comment9 comments  |  Read  |  Post a Comment
Data Manipulation: An Imminent Threat
John Moynihan, President, Minuteman GovernanceCommentary
Critical industries are largely unprepared for a potential wave of destructive attacks.
By John Moynihan President, Minuteman Governance, 9/12/2016
Comment2 comments  |  Read  |  Post a Comment
Multi-Factor IT Authentication Hampers Progress, Say 47% US Companies
Dark Reading Staff, Quick Hits
IS Decisions survey finds organizations are looking for alternate to multi-factor verification, which they believe takes up time and slows productivity.
By Dark Reading Staff , 9/9/2016
Comment3 comments  |  Read  |  Post a Comment
8 Security Categories Healthcare Providers Need to Improve On
Steve Zurier, Freelance Writer
A new survey by HIMSS finds that many providers dont even cover the basics of IT security.
By Steve Zurier Freelance Writer, 9/6/2016
Comment1 Comment  |  Read  |  Post a Comment
How To Bullet Proof Your PAM Accounts: 7 Tips
Steve Zurier, Freelance Writer
Recent studies demonstrate the need for companies to focus more on their privileged users.
By Steve Zurier Freelance Writer, 8/26/2016
Comment0 comments  |  Read  |  Post a Comment
Darknet: Where Your Stolen Identity Goes to Live
Itay Glick, CEO & Co-founder, VotiroCommentary
Almost everything is available on the Darknet -- drugs, weapons, and child pornography -- but where it really excels is as an educational channel for beginning identity thieves.
By Itay Glick CEO & Co-founder, Votiro, 8/19/2016
Comment1 Comment  |  Read  |  Post a Comment
User Ed: Patching People Vs Vulns
Lysa Myers, Security Researcher, ESETCommentary
How infosec can combine and adapt security education and security defenses to the way users actually do their jobs.
By Lysa Myers Security Researcher, ESET, 8/17/2016
Comment0 comments  |  Read  |  Post a Comment
Organizations Still Give Employees More Access Than They Need
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Ponemon study shows that access to proprietary information remains on the rise.
By Ericka Chickowski Contributing Writer, Dark Reading, 8/9/2016
Comment1 Comment  |  Read  |  Post a Comment
Data Protection From The Inside Out
Dan Frank, Deloitte Advisory Principal, Cyber Risk ServicesCommentary
Organizations must make fundamental changes in the way they approach data protection.
By Dan Frank Deloitte Advisory Principal, Cyber Risk Services, 8/8/2016
Comment1 Comment  |  Read  |  Post a Comment
8 Alternatives to Selfie Authentication
Terry Sweeney, Contributing Editor
How to definitively prove your identity? A variety of anatomical parts and functions may soon be able to vouch for you.
By Terry Sweeney Contributing Editor, 8/4/2016
Comment1 Comment  |  Read  |  Post a Comment
Crypto Malware: Responding To Machine-Timescale Breaches
Simon Crosby, Co-founder & CTO, BromiumCommentary
The game has changed again with hackers ability to steal your data at record speeds and cripple your organization before the first alert.
By Simon Crosby Co-founder & CTO, Bromium, 8/1/2016
Comment2 comments  |  Read  |  Post a Comment
How To Stay Safe On The Black Hat Network: Dont Connect To It
Neil R. Wyler (Grifter), Threat Hunting and Incident Response Specialist, RSACommentary
Black Hat attendees may have changed their titles and now carry business cards but hackers gotta hack and theres no better place to do it than Black Hat.
By Neil R. Wyler (Grifter) Threat Hunting and Incident Response Specialist, RSA, 7/28/2016
Comment11 comments  |  Read  |  Post a Comment
7 Ways To Charm Users Out of Their Passwords
Terry Sweeney, Contributing Editor
While the incentives have changed over time, it still takes remarkably little to get users to give up their passwords.
By Terry Sweeney Contributing Editor, 7/27/2016
Comment13 comments  |  Read  |  Post a Comment
7 Ways To Lock Down Your Privileged Accounts
Steve Zurier, Freelance Writer
Admin passwords contained within privileged accounts can open up the keys to the kingdom to determined attackers. Here's how to stop them.
By Steve Zurier Freelance Writer, 7/22/2016
Comment0 comments  |  Read  |  Post a Comment
Ex-Cardinal Exec Jailed For Hacking Astros
Dark Reading Staff, Quick Hits
Christopher Correa gets 46 months for unlawful access of rivals database and downloading confidential details.
By Dark Reading Staff , 7/20/2016
Comment1 Comment  |  Read  |  Post a Comment
What SMBs Need To Know About Security But Are Afraid To Ask
Sean Martin, CISSP | President, imsmartin
A comprehensive set of new payment protection resources from the PCI Security Standards Council aims to help small- and medium-sized businesses make security a priority.
By Sean Martin CISSP | President, imsmartin, 7/14/2016
Comment1 Comment  |  Read  |  Post a Comment
Hackers Pilfer $10 Million From Ukraine Bank
Dark Reading Staff, Quick Hits
Reports allege criminals used SWIFT to transfer money, have compromised several Ukraine, Russia banks.
By Dark Reading Staff , 6/29/2016
Comment3 comments  |  Read  |  Post a Comment
Cisco Boosts Cloud Security Capabilities With CloudLock Buy
Jai Vijayan, Freelance writerNews
Network giant will purchase the Massachusetts-based provider of cloud access security broker technology for $293 million.
By Jai Vijayan Freelance writer, 6/28/2016
Comment1 Comment  |  Read  |  Post a Comment
Google Accounts Of US Military, Journalists Targeted By Russian Attack Group
Sara Peters, Senior Editor at Dark ReadingNews
The Threat Group 4127 that hit the Democratic National Committee also went after 1,800 other targets with info interesting to Russian government, says SecureWorks.
By Sara Peters Senior Editor at Dark Reading, 6/27/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.