News & Commentary
10 Cybercrime Myths that Could Cost You Millions
Mark Wilczek, Digital Strategist & CIO AdvisorCommentary
Dont let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.
By Mark Wilczek Digital Strategist & CIO Advisor, 4/29/2017
Comment2 comments  |  Read  |  Post a Comment
HHS Hits CardioNet with $2.5M HIPAA Settlement Fee
Dark Reading Staff, Quick Hits
The US Department of Health and Human Services slapped the mobile cardiac monitoring service with fee after breach of customer health data.
By Dark Reading Staff , 4/26/2017
Comment2 comments  |  Read  |  Post a Comment
Microsoft App Aims to Delete the Password
Kelly Sheridan, Associate Editor, Dark ReadingNews
Microsoft has officially launched its Authenticator app designed to simplify and secure user logins, raising questions about the future of password-free authentication.
By Kelly Sheridan Associate Editor, Dark Reading, 4/26/2017
Comment9 comments  |  Read  |  Post a Comment
Call Center Fraud Spiked 113% in 2016
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Criminals are increasingly spoofing caller ID using VoIP apps including Skype or Google Voice to hide their identity and location, according to a report released today by Pindrop Labs.
By Dawn Kawamoto Associate Editor, Dark Reading, 4/26/2017
Comment0 comments  |  Read  |  Post a Comment
Hyundai Blue Link Vulnerability Allows Remote Start of Cars
Dark Reading Staff, Quick Hits
Car maker Hyundai patched a vulnerability in its Blue Link software, which could potentially allow attackers to remotely unlock a vehicle and start it.
By Dark Reading Staff , 4/25/2017
Comment1 Comment  |  Read  |  Post a Comment
1 Out of 5 Companies Have Suffered Mobile Device Breach
Dark Reading Staff, Quick Hits
A survey on security solutions for mobile devices finds 24% don't even know if they have been breached.
By Dark Reading Staff , 4/14/2017
Comment1 Comment  |  Read  |  Post a Comment
Securing your Privacy on Android
Nathan Collier, Senior Malware Intelligence Analyst, Malwarebytes
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, youre more of a security risk than you think.
By Nathan Collier Senior Malware Intelligence Analyst, Malwarebytes, 4/12/2017
Comment0 comments  |  Read  |  Post a Comment
When Hacks Are about Image instead of Money
Michael Sutton, Chief Information Security Office, ZscalerCommentary
If you think fake news is a problem, how about the possibility of fake medical or financial information making the rounds with no way to verify its legitimacy?
By Michael Sutton Chief Information Security Office, Zscaler, 4/11/2017
Comment1 Comment  |  Read  |  Post a Comment
Pegasus For Android Spyware Just As Lethal As iOS Version
Jai Vijayan, Freelance writerNews
Researchers from Lookout, Google describe it as highly sophisticated tool for targeted surveillance purposes.
By Jai Vijayan Freelance writer, 4/6/2017
Comment0 comments  |  Read  |  Post a Comment
McAfee's Back as an Independent Security Firm
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Security firm is no longer part of Intel Corp.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/4/2017
Comment2 comments  |  Read  |  Post a Comment
Cybercriminals Seized Control of Brazilian Bank for 5 Hours
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Sophisticated heist compromised major bank's entire DNS infrastructure.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/4/2017
Comment0 comments  |  Read  |  Post a Comment
How Identity Deception Increases the Success of Ransomware
Markus Jakobsson, Chief Scientist at AgariCommentary
As scammers hone their skills, their handiwork looks more credible to intended victims, making a successful ransomware scam more likely.
By Markus Jakobsson Chief Scientist at Agari, 3/28/2017
Comment3 comments  |  Read  |  Post a Comment
Jail Time Set for Two More Members of Global Telecom Fraud Scheme
Dark Reading Staff, Quick Hits
Ramon Batista and Farintong Calderon have been sentenced to 75 months and 36 months in prison, respectively.
By Dark Reading Staff , 3/28/2017
Comment1 Comment  |  Read  |  Post a Comment
Cybercriminals Exploit March Madness Frenzy
Dark Reading Staff, Quick Hits
Users are clicking on dubious links to stream matches and exposing confidential data to hackers, says Zscaler.
By Dark Reading Staff , 3/27/2017
Comment0 comments  |  Read  |  Post a Comment
Sound Waves Used to Hack Common Data Sensors
Terry Sweeney, Contributing EditorNews
Though the immediate threat to your smartphone or Fitbit is slight, University of Michigan researchers show command-and-control capability with spoofed signaling on a variety of MEMS accelerometers.
By Terry Sweeney Contributing Editor, 3/16/2017
Comment0 comments  |  Read  |  Post a Comment
Google Removes Chamois Apps Botnet from Play Store
Dark Reading Staff, Quick Hits
Google has eliminated Chamois apps, which installed invisible apps and downloaded unwanted plugins without victims' knowledge.
By Dark Reading Staff , 3/16/2017
Comment1 Comment  |  Read  |  Post a Comment
Enterprises Hit with Malware Preinstalled on their Androids
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Check Point details evidence of mobile supply chain problems based on infections on devices at two large organizations.
By Ericka Chickowski Contributing Writer, Dark Reading, 3/13/2017
Comment0 comments  |  Read  |  Post a Comment
Mobile (In)security: Dark Reading Cartoon Caption Contest Winners
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Clever word play on mobile ransomware, cloud and the Internet of Things. And the winners are
By Marilyn Cohodas Community Editor, Dark Reading, 3/9/2017
Comment4 comments  |  Read  |  Post a Comment
Trojan Android App Bullies Google Play Users Into Giving It 5 Stars
Dark Reading Staff, Quick Hits
Users who download "Music Mania" get pounded by ads until they say uncle.
By Dark Reading Staff , 3/9/2017
Comment0 comments  |  Read  |  Post a Comment
Consumer Reports to Grade Products on Cybersecurity
Dark Reading Staff, Quick Hits
The ratings group will begin to consider products' cybersecurity following a rise in attacks on IoT devices.
By Dark Reading Staff , 3/7/2017
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.