Endpoint //

Privacy

News & Commentary
What's Next After HTTPS: A Fully Encrypted Web?
Guy Podjarny, CEO & Cofounder, SnykCommentary
As the rate of HTTPS adoption grows faster by the day, it's only a matter of time before a majority of websites turn on SSL. Here's why.
By Guy Podjarny CEO & Cofounder, Snyk, 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
Banks Start Broad Use of Blockchain, as JP Morgan, IBM Lead Way
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Two major players announced cross-border payment networks built on blockchain technologies Monday, and more financial services will follow soon, despite opinions about Bitcoin.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Google Bolsters Security for Select Groups
Dark Reading Staff, Quick Hits
Business leaders, political campaign teams, journalists, and other high-risk groups will receive advanced email and account protection.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Secure Wifi Hijacked by KRACK Vulns in WPA2
Jai Vijayan, Freelance writerNews
All modern WiFi access points and devices that have implemented the protocol vulnerable to attacks that allow decryption, traffic hijacking other attacks. Second, unrelated crypto vulnerability also found in RSA code library in TPM chips.
By Jai Vijayan Freelance writer, 10/16/2017
Comment1 Comment  |  Read  |  Post a Comment
GDPR Compliance: 5 Early Steps to Get Laggards Going
Sara Peters, Senior Editor at Dark Reading
If you're just getting on the EU General Data Protection Regulation bandwagon, here's where you should begin.
By Sara Peters Senior Editor at Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
IoT: Insecurity of Things or Internet of Threats?
Kelly Sheridan, Associate Editor, Dark ReadingNews
Security leaders call for device manufacturers to buckle down on device security as the Internet of Things evolves.
By Kelly Sheridan Associate Editor, Dark Reading, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
How Systematic Lying Can Improve Your Security
Lance Cottrell, Chief Scientist, NtrepidCommentary
No, you don't have to tell websites your mother's actual maiden name.
By Lance Cottrell Chief Scientist, Ntrepid, 10/11/2017
Comment3 comments  |  Read  |  Post a Comment
Why Your Business Must Care about Privacy
Niko Keller, Co-founder and CTO of Opaque CommunicationsCommentary
It might not have something to hide, but it definitely has something to protect.
By Niko Keller Co-founder and CTO of Opaque Communications, 9/26/2017
Comment1 Comment  |  Read  |  Post a Comment
FBI's Freese Shares Risk Management Tips
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Deputy Assistant Director Donald Freese advises enterprises to lead with a business case and not fear addressing the C-suite on risk management.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/26/2017
Comment0 comments  |  Read  |  Post a Comment
If Blockchain Is the Answer, What Is the Security Question?
Duncan Jones, Head of Skunkworks, Thales e-SecurityCommentary
Like any technology, blockchain has its strengths and weaknesses. But debunking three common myths can help you cut through the hype.
By Duncan Jones Head of Skunkworks, Thales e-Security, 9/8/2017
Comment0 comments  |  Read  |  Post a Comment
Activists Beware: The Latest In 3G & 4G Spying
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Ravi Borgaonkar describes new 3G & 4G vulnerabilities that enable IMSI catchers to be smarter, stealthier snoopers.
By Sara Peters Senior Editor at Dark Reading, 9/5/2017
Comment0 comments  |  Read  |  Post a Comment
Mikko Hypponen's Vision of the Cybersecurity Future
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Twenty years from now, will everything be in the Internet of Things, and if so, how does the security industry need to prepare? F-Secure's chief research officer weighs in on this and what else the future promises (and threatens).
By Sara Peters Senior Editor at Dark Reading, 9/4/2017
Comment2 comments  |  Read  |  Post a Comment
Turning Sound Into Keystrokes: Skype & Type
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Don't let your fingers do the talking in a Skype session. The callers on the other end could know what you're writing, researcher Daniele Lain explains.
By Sara Peters Senior Editor at Dark Reading, 8/25/2017
Comment1 Comment  |  Read  |  Post a Comment
How Quantum Computing Will Change Browser Encryption
David Holmes, World-Wide Security Evangelist, F5
From a protocol point of view, were closer to a large-scale quantum computer than many people think. Heres why thats an important milestone.
By David Holmes World-Wide Security Evangelist, F5, 8/24/2017
Comment0 comments  |  Read  |  Post a Comment
GoT & the Inside Threat: Compromised Insiders Make Powerful Adversaries
Orion Cassetto, Senior Product Maester, ExabeamCommentary
What Game of Thrones' Arya Stark and the Faceless Men can teach security pros about defending against modern malware and identity theft.
By Orion Cassetto Senior Product Maester, Exabeam, 8/24/2017
Comment13 comments  |  Read  |  Post a Comment
GDPR Compliance Preparation: A High-Stakes Guessing Game
Peter Merkulov, VP, Product Strategy & Technology AlliancesCommentary
It's difficult to tell if your company is meeting the EU's data privacy and security standards -- or US standards, for that matter.
By Peter Merkulov VP, Product Strategy & Technology Alliances, 8/24/2017
Comment2 comments  |  Read  |  Post a Comment
Risky Business: Why Enterprises Cant Abdicate Cloud Security
John Moynihan, President, Minuteman GovernanceCommentary
It's imperative for public and private sector organizations to recognize the essential truth that governance of data entrusted to them cannot be relinquished, regardless of where the data is maintained.
By John Moynihan President, Minuteman Governance, 8/7/2017
Comment1 Comment  |  Read  |  Post a Comment
Are Third-Party Services Ready for the GDPR?
Hadar Blutrich, CEO of Source DefenseCommentary
Third-party scripts are likely to be a major stumbling block for companies seeking to be in compliance with the EU's new privacy rules. Here's a possible work-around.
By Hadar Blutrich CEO of Source Defense, 8/4/2017
Comment0 comments  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2017
Dark Reading Staff, Commentary
Over 40 interviews streaming live right from Black Hat USA, July 26-27, from 2 p.m. - 7 p.m. Eastern Time (11 - 4 P.T.).
By Dark Reading Staff , 7/27/2017
Comment4 comments  |  Read  |  Post a Comment
The Right to Be Forgotten & the New Era of Personal Data Rights
Dimitri Sirota, Founder & CEO of BigIDCommentary
Because of the European Union's GDPR and other pending legislation, companies must become more transparent in how they protect their customers' data.
By Dimitri Sirota Founder & CEO of BigID, 7/27/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Cybersecurity's 'Broken' Hiring Process
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/11/2017
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What did you expect from this SOC? A unicorn....
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.