Risk
News & Commentary
Advisory Body Calls For Stronger Cybersecurity Measures Across Airline Industry
Jai Vijayan, Freelance writerNews
Measures are designed to bolster operational security across all stakeholders in the aviation sector, Wall Street Journal says.
By Jai Vijayan Freelance writer, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
Top Democrats Tell Putin To Halt Hacking Of US Political Parties
Dark Reading Staff, Quick Hits
Russia trying to influence November presidential elections, say Senator Dianne Feinstein and Rep. Adam Schiff.
By Dark Reading Staff , 9/23/2016
Comment2 comments  |  Read  |  Post a Comment
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Will Ackerly, Co-Founder & CTO, VirtruCommentary
Oliver Stones movie shows us that while most of us have nothing to hide, we all have information worth protecting both technically and constitutionally.
By Will Ackerly Co-Founder & CTO, Virtru, 9/22/2016
Comment9 comments  |  Read  |  Post a Comment
10 Ways To Lock Down Third-Party Risk
Steve Zurier, Freelance Writer
Experts share ideas for closing potential security holes that leave organizations open to attack.
By Steve Zurier Freelance Writer, 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
Rand Study: Average Data Breach Costs $200K, Not Millions
Terry Sweeney, Contributing EditorNews
Rand taps multiple data sources to calculate that cyber incidents cost firms a scant 0.4% of annual revenues, on average.
By Terry Sweeney Contributing Editor, 9/21/2016
Comment2 comments  |  Read  |  Post a Comment
Chinese Researchers Hack Tesla S Models, Expose Bugs
Dark Reading Staff, Quick Hits
Automaker fixes security risks after Tencent Holdings uncover vulnerabilities in both parking and drive mode.
By Dark Reading Staff , 9/21/2016
Comment1 Comment  |  Read  |  Post a Comment
Lack Of Funding Stymies State CISOs
Rutrell Yasin, Freelance WriterNews
Governors, other state officials more aware of cyber threats, but confidence gap exists between IT and business managers, new Deloitte-National State Chief Information Officers (NASCIO) study finds.
By Rutrell Yasin Freelance Writer, 9/20/2016
Comment5 comments  |  Read  |  Post a Comment
Hacking 'Forward With Weaponized Intelligence
Danelle Au, VP Strategy, SafeBreachCommentary
Instead of hacking back and taking the fight to your adversary, what if your organization hacked forward by unearthing breach scenarios before the hackers do?
By Danelle Au VP Strategy, SafeBreach, 9/20/2016
Comment2 comments  |  Read  |  Post a Comment
2016 On Track To See Over 1 Billion Records Breached
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New report shows first half breach statistics put organizations on pace to beat last year's breach numbers by a wide margin.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/20/2016
Comment0 comments  |  Read  |  Post a Comment
Top Colleges For Cybersecurity
Ericka Chickowski, Contributing Writer, Dark Reading
Check out these respected post-secondary U.S. cybersecurity education programs at both undergraduate and graduate levels.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/19/2016
Comment3 comments  |  Read  |  Post a Comment
FBI May Seek Legal Action Against Russian Hackers
Dark Reading Staff, Quick Hits
US government under pressure to take action against cyberattackers believed to be part of Russian intelligence groups, say sources.
By Dark Reading Staff , 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
Uber, Dropbox, Other Tech Leaders Team Up To Boost Vendor Security
Kelly Sheridan, Associate Editor, InformationWeekNews
Tech companies - including Uber, Dropbox, Twitter, and Docker - have joined forces to create the Vendor Security Alliance, which aims to vet vendor security practices.
By Kelly Sheridan Associate Editor, InformationWeek, 9/16/2016
Comment0 comments  |  Read  |  Post a Comment
Why You May Need To Shake Up Your DevOps Team To Manage The Cloud
Mike Milner, Cofounder & CTO, IMMUNIOCommentary
The security approaches of yesterday wont work in the cloud world of today and tomorrow.
By Mike Milner, Immunio , 9/16/2016
Comment1 Comment  |  Read  |  Post a Comment
20 Questions Security Leaders Need To Ask About Analytics
Joshua Goldfarb, VP & CTO - Emerging Technologies, FireEyeCommentary
The game of 20 questions is a great way to separate vendors that meets your needs from those who will likely disappoint.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 9/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Data Loss Risks Rise In The Age Of Collaboration
Kelly Sheridan, Associate Editor, InformationWeekNews
Most organizations believe they have lost sensitive information due to external file sharing and third-party collaboration.
By Kelly Sheridan Associate Editor, InformationWeek, 9/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Password Reuse: Dont Mix Business With Personal
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
Employee education, password managers, and multifactor authentication can reduce the risk of a personal breach becoming a corporate security event.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 9/14/2016
Comment1 Comment  |  Read  |  Post a Comment
Risk Management Best Practices For CISOs
Jim Bandanza & Mike D. Kail, Cyber Security Industry Advisor & Cybric Chief Innovation OfficerCommentary
What's your company's risk appetite? Our list of best practices can help you better understand a difficult topic.
By Jim Bandanza and Mike D. Kail , 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity In The Obama Era
Rutrell Yasin, Business Technology Writer, Tech Writers Bureau
Our roundup of the Obama administrations major initiatives, executive orders and actions over the past seven and a half years. How would you grade the president's cybersecurity achievements?
By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 9/13/2016
Comment2 comments  |  Read  |  Post a Comment
A Moving Target: Tackling Cloud Security As A Data Issue
Sheila B. Jordan, SVP & CIO, SymantecCommentary
Todays challenge is protecting critical information that an increasingly mobile workforce transfers every day between clouds, between cloud and mobile, and between cloud, mobile, and IoT.
By Sheila B. Jordan SVP & CIO, Symantec, 9/13/2016
Comment1 Comment  |  Read  |  Post a Comment
New Book Traces Obama Strategy To Protect America From Hackers, Terrorists & Nation States
Wilson Alexander, Writer, Student & AthleteCommentary
A review of Charlie Mitchell's 'Hacked: The Inside Story of Americas Struggle to Secure Cyberspace.'
By Wilson Alexander Writer, Student & Athlete, 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.