Operations
News & Commentary
7 New Rules For IoT Safety & Vuln Disclosure
Lysa Myers, Security Researcher, ESETCommentary
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!
By Lysa Myers Security Researcher, ESET, 9/24/2016
Comment0 comments  |  Read  |  Post a Comment
An Open-Source Security Maturity Model
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Oh you don't run open-source code? Really? Christine Gadsby and Jake Kouns explain how to identify and secure all those open-source libraries and other third-party components lurking inside your applications, proprietary and otherwise.
By Sara Peters Senior Editor at Dark Reading, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
On-Premises & In The Cloud: Making Sense Of Your Cybersecurity Ecosystem
Yishai Beeri, Director of Cybersecurity Research, CloudLockCommentary
As enterprises continue to invest in hybrid cloud strategies, they need their fragmented security solutions to work together.
By Yishai Beeri Director of Cybersecurity Research, CloudLock, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
FTC Releases Video With Data Breach Recovery Advice
Dark Reading Staff, Quick Hits
The US Federal Trade Commission video has detailed instructions on what to do if personal data of a user is stolen and exposed.
By Dark Reading Staff , 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
7 Factors That Make Security Organizations More Effective
Steve Zurier, Freelance WriterNews
(ISC)2 members have plenty of technical chops, but IANS research found they need to focus more on how infosec aligns with the business.
By Steve Zurier Freelance Writer, 9/22/2016
Comment1 Comment  |  Read  |  Post a Comment
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Will Ackerly, Co-Founder & CTO, VirtruCommentary
Oliver Stones movie shows us that while most of us have nothing to hide, we all have information worth protecting both technically and constitutionally.
By Will Ackerly Co-Founder & CTO, Virtru, 9/22/2016
Comment9 comments  |  Read  |  Post a Comment
10 Ways To Lock Down Third-Party Risk
Steve Zurier, Freelance Writer
Experts share ideas for closing potential security holes that leave organizations open to attack.
By Steve Zurier Freelance Writer, 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
NYSE Deals Blow To John McAfee's MGT Capital
Dark Reading Staff, Quick Hits
MGT searches for alternatives as share listing approval denied, causing deep plunge in share price.
By Dark Reading Staff , 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
National Health ISAC Calls For Collaborative Vuln Disclosure
Sara Peters, Senior Editor at Dark ReadingNews
St. Jude Medical to host upcoming workshop on medical device info sharing, convened by NH-ISAC and medical device security consortium.
By Sara Peters Senior Editor at Dark Reading, 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
What Smart Cities Can Teach Enterprises About Security
Gary Hayslip, Deputy Director, CISO, City of San DiegoCommentary
The more you simplify your security program while still being effective, the better, says San Diegos chief information security officer. Heres his three-step process.
By Gary Hayslip Deputy Director, CISO, City of San Diego, 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
20 Questions Security Leaders Need To Ask About Analytics
Joshua Goldfarb, VP & CTO - Emerging Technologies, FireEyeCommentary
The game of 20 questions is a great way to separate vendors that meets your needs from those who will likely disappoint.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 9/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Stop Blaming Users. Make Security User-Friendly.
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jelle Niemantsverdriet of Deloitte explains how security improves if security tools and error messages educate users and 'put a smile on someone's face.'
By Sara Peters Senior Editor at Dark Reading, 9/15/2016
Comment1 Comment  |  Read  |  Post a Comment
France's Online Criminal Underground Built On Foundation Of Distrust
Sara Peters, Senior Editor at Dark ReadingNews
French criminals seeking black market goods and services -- cyber and otherwise -- have to look in darker shadows and work harder to prove their felonious credibility.
By Sara Peters Senior Editor at Dark Reading, 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Keep It Simple: Security For A Complex Enterprise
Dark Reading Staff, CommentaryVideo
Michelle Cobb of Skybox Security talks to Dark Reading about security management.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Taking Down Impersonators: Methods For Combating Email Fraud
Dark Reading Staff, CommentaryVideo
Bob Adams, cybersecurity strategist at Mimecast, stops by the Black Hat News Desk.
By Dark Reading Staff , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
DoJ Announces Team To Oversee Security Of Internet of Things
Dark Reading Staff, Quick Hits
Group will study and address security challenges from devices that are linked to the internet and may pose a threat to national safety.
By Dark Reading Staff , 9/13/2016
Comment2 comments  |  Read  |  Post a Comment
New Book Traces Obama Strategy To Protect America From Hackers, Terrorists & Nation States
Wilson Alexander, Writer, Student & AthleteCommentary
A review of Charlie Mitchell's 'Hacked: The Inside Story of Americas Struggle to Secure Cyberspace.'
By Wilson Alexander Writer, Student & Athlete, 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
Data Manipulation: An Imminent Threat
John Moynihan, President, Minuteman GovernanceCommentary
Critical industries are largely unprepared for a potential wave of destructive attacks.
By John Moynihan President, Minuteman Governance, 9/12/2016
Comment2 comments  |  Read  |  Post a Comment
Multi-Factor IT Authentication Hampers Progress, Say 47% US Companies
Dark Reading Staff, Quick Hits
IS Decisions survey finds organizations are looking for alternate to multi-factor verification, which they believe takes up time and slows productivity.
By Dark Reading Staff , 9/9/2016
Comment3 comments  |  Read  |  Post a Comment
RSA's Yoran Says Firm's Mission Remains Unchanged In Dell-EMC Merger
Jai Vijayan, Freelance writerNews
RSA remains in full charge of its destiny, RSA president Amit Yoran says.
By Jai Vijayan Freelance writer, 9/8/2016
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.