Operations // Identity & Access Management
News & Commentary
10 Cocktail Party Security Tips From The Experts
Steve Zurier, Freelance Writer
Security pros offer basic advice to help average users ward off the bad guys.
By Steve Zurier Freelance Writer, 1/13/2017
Comment1 Comment  |  Read  |  Post a Comment
Credit Freeze: The New Normal In Data Breach Protection?
Lysa Myers, Security Researcher, ESETCommentary
In era of rampant identity theft, consumers should be offered the protection of a credit freeze by default, instead of a nuisance fee each time a freeze is placed or removed.
By Lysa Myers Security Researcher, ESET, 1/11/2017
Comment1 Comment  |  Read  |  Post a Comment
Survey Points to Slight Rise in Adaptive Authentication Over 2FA
Steve Zurier, Freelance WriterNews
SecureAuth study reports a majority of IT decision makers and security pros have issues with two-factor authentication.
By Steve Zurier Freelance Writer, 1/11/2017
Comment0 comments  |  Read  |  Post a Comment
A Vendor's Security Reality: Comply Or Good-Bye
John Moynihan, President, Minuteman GovernanceCommentary
Privacy compliance is now mission critical. Third-party suppliers that fail to meet data protection mandates will be excluded from doing business in lucrative vertical markets.
By John Moynihan President, Minuteman Governance, 1/4/2017
Comment0 comments  |  Read  |  Post a Comment
Yahoo Customer Database Unaffected By Breaches
Dark Reading Staff, Quick Hits
Verto Analytics study reveals longtime users prefer sticking to Yahoo despite hacks to avoid switching hassles.
By Dark Reading Staff , 1/3/2017
Comment3 comments  |  Read  |  Post a Comment
Macau Resident Held For Hacking, Insider Trading Charges In US
Dark Reading Staff, Quick Hits
Iat Hong and two others allegedly breached computers of major US law firms and stole confidential exchange on M&A transactions.
By Dark Reading Staff , 12/28/2016
Comment0 comments  |  Read  |  Post a Comment
Network Security: An Ounce Of Prevention Is Worth A Pound Of Reaction
Jon Kim, Director of NextGen Networking, Force 3Commentary
For humans ailments, prevention might begin with an allergist. In security, it's the network engineer.
By Jon Kim Director of NextGen Networking, Force 3, 12/22/2016
Comment4 comments  |  Read  |  Post a Comment
Financial Data Worth Millions Unwittingly Exposed In Ameriprise Accounts
Dark Reading Staff, Quick Hits
Leak of bank account and financial planning details emanated from a financial advisor's unsecured Internet-connected backup drive at home.
By Dark Reading Staff , 12/19/2016
Comment0 comments  |  Read  |  Post a Comment
8 Most Hackable Holiday Gifts, 2016 Edition
Terry Sweeney, Contributing Editor
You better watch out! Otherwise, you may be giving the gift of malware or unauthorized access to networks and devices.
By Terry Sweeney Contributing Editor, 12/14/2016
Comment0 comments  |  Read  |  Post a Comment
The Internet Of Things: When Bigger Is Not Better
Paul Vixie, Chairman & CEO, Farsight Security, Inc.Commentary
What happens when 10,000 companies add programmability and connectivity to their products, and we increase the Internets attack surface by a million times or more?
By Paul Vixie Chairman & CEO, Farsight Security, Inc., 12/13/2016
Comment0 comments  |  Read  |  Post a Comment
Pay Ransom Or Infect Others!
Dark Reading Staff, Quick Hits
Still under development, new ransomware will ask victims to free their files by paying 1 bitcoin or by infecting two others.
By Dark Reading Staff , 12/12/2016
Comment3 comments  |  Read  |  Post a Comment
How Retailers Can Fight Holiday Season Hackers
Steve Zurier, Freelance Writer
Experts offer tips for locking down retailers point-of-sale systems for the busy holiday shopping season.
By Steve Zurier Freelance Writer, 12/8/2016
Comment0 comments  |  Read  |  Post a Comment
Researchers Find Backdoors, Bugs In Sony, White Box IP Cameras
Jai Vijayan, Freelance writerNews
New vulnerabilities discovered by SEC Consult and Cybereason highight increasing IoT threat to enterprises.
By Jai Vijayan Freelance writer, 12/7/2016
Comment1 Comment  |  Read  |  Post a Comment
Biometric Technology Is Not A Cure-All For Password Woes
Corey Nachreiner, Chief Technology Officer, WatchGuard TechnologiesCommentary
No single authentication token is infallible. The only real solution is multifactor authentication.
By Corey Nachreiner Chief Technology Officer, WatchGuard Technologies, 12/7/2016
Comment0 comments  |  Read  |  Post a Comment
Dark Web Vendor Gets 50 Months Jail For ID Theft
Dark Reading Staff, Quick Hits
Minnesota resident Aaron Glende aka IcyEagle caught selling stolen bank details on AlphaBay market.
By Dark Reading Staff , 12/2/2016
Comment2 comments  |  Read  |  Post a Comment
Cybersecurity User Training That Sticks: 3 Steps
Lysa Myers, Security Researcher, ESETCommentary
People are eager for common-sense advice that gives them control over their environment and helps them stay safe online.
By Lysa Myers Security Researcher, ESET, 11/29/2016
Comment0 comments  |  Read  |  Post a Comment
Symantec To Buy LifeLock At $2.3 Billion
Dark Reading Staff, Quick Hits
Deal set to be finalized by Q1 2017 and financed by cash and $750 million of new debt.
By Dark Reading Staff , 11/22/2016
Comment0 comments  |  Read  |  Post a Comment
WindTalker Attack Finds New Vulnerabilities in Wi-Fi Networks
Steve Zurier, Freelance WriterNews
White hat researchers show how hackers read keystrokes to potentially compromise cellphone and tablet users on public Wi-Fi and home networks.
By Steve Zurier Freelance Writer, 11/21/2016
Comment0 comments  |  Read  |  Post a Comment
5 Ways Retailers Can Stay Safe Over the Holidays
Steve Zurier, Freelance Writer
E-commerce experts offer tips for locking down systems as the busy holiday season approaches.
By Steve Zurier Freelance Writer, 11/21/2016
Comment1 Comment  |  Read  |  Post a Comment
Cyber Monday, Consumers & The Bottom Line Of A Data Breach
Tony Buffomante, KPMG, U.S. Cyber Security Services LeaderCommentary
Yes retailers can achieve ROI for their investments in cybersecurity during the upcoming holiday season - and for the rest of the year, too! Heres how.
By Tony Buffomante KPMG, U.S. Cyber Security Services Leader, 11/18/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Joe Stanganelli
Current Conversations "No, I think he's just a UNIX programmer."
In reply to: lu
Post Your Own Reply
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Secure Application Development - New Best Practices
Secure Application Development - New Best Practices
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.