Must Reads
Dark Reading Tech Digest, June 2015
Publish Date: Jun 1,2015
Dark Reading - March 2, 2015
Publish Date: Mar 2,2015
Dark Reading Tech Digest, Dec. 19, 2014
Publish Date: Dec 19,2014
Dark Reading, January 2015
Publish Date: Dec 15,2014
Dark Reading Must Reads, Dec. 10, 2014
Publish Date: Dec 10,2014
Dark Reading Must Reads, Dec. 8, 2014
Publish Date: Dec 8,2014
Dark Reading December Tech Digest
Publish Date: Nov 17,2014
Dark Reading's November Tech Digest
Publish Date: Nov 11,2014
Dark Reading's November Tech Digest
Publish Date: Nov 5,2014
Dark Reading's October Tech Digest
Publish Date: Oct 13,2014
Dark Reading Must Reads - September 25, 2014
Publish Date: Sep 25,2014
Dark Reading, September 16, 2014
Publish Date: Sep 16,2014
Dark Reading Must Reads July 15, 2014
Publish Date: Jul 15,2014
DarkReading Tech Digest -June 9, 2014
Publish Date: Jul 8,2014
Dark Reading May 2014 Must Reads
Publish Date: May 28,2014
Dark Reading December 2013 Must Reads
Publish Date: Dec 11,2013
Dark Reading December 2013 Must Reads
Publish Date: Dec 3,2013
Dark Reading October 2013 IT Trends
Publish Date: Oct 9,2013
Dark Reading October 2013 Must Reads - Risk Management
Publish Date: Oct 2,2013
Dark Reading October 2013 Must Reads
Publish Date: Sep 26,2013
Dark Reading July 2013 IT Trends
Publish Date: Jul 17,2013
Dark Reading July 2013 Must Reads
Publish Date: Jul 11,2013
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-5084
Published: 2015-08-02
The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically approximate attackers to obtain sensitive information via unspecified vectors.

CVE-2015-5352
Published: 2015-08-02
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time ...

CVE-2015-5537
Published: 2015-08-02
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.

CVE-2015-5600
Published: 2015-08-02
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumptio...

CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!