Risk
News & Commentary
Going Beyond Checkbox Security
Emily Johnson, Digital Content Editor, InformationWeekCommentaryVideo
Terry Barbounis, cybersecurity evangelist for CenturyLink, stops by the InformationWeek News Desk.
By Emily Johnson Digital Content Editor, InformationWeek, 5/24/2017
Comment0 comments  |  Read  |  Post a Comment
Data Security & Privacy: The Risks of Not Playing by the Rules
Peter Merkulov, VP, Product Strategy & Technology AlliancesCommentary
Achieving compliance is a complex and challenging process. But with the right systems and policies, you can stay ahead of the next data breach and the regulators.
By Peter Merkulov VP, Product Strategy & Technology Alliances, 5/24/2017
Comment1 Comment  |  Read  |  Post a Comment
Target Reaches Breach Settlement: $18.5 Million Fine, Security Controls
Kelly Sheridan, Associate Editor, Dark ReadingNews
Target to cough up $18.5 million to 47 states in a settlement following its 2013 security breach, which exposed data of millions of customers.
By Kelly Sheridan Associate Editor, Dark Reading, 5/24/2017
Comment3 comments  |  Read  |  Post a Comment
9 Ways Organizations Sabotage Their Own Security: Lessons from the Verizon DBIR
Dawn Kawamoto, Associate Editor, Dark Reading
Mistakes and missteps plague enterprise security. The Verizon 2017 Data Breach Investigations Report (DBIR) offers nuggets on what organizations must stop doing now.
By Dawn Kawamoto Associate Editor, Dark Reading, 5/23/2017
Comment0 comments  |  Read  |  Post a Comment
5 Security Lessons WannaCry Taught Us the Hard Way
Ericka Chickowski, Contributing Writer, Dark ReadingNews
There is a lot more our industry should be doing to protect its systems and data from cyber blackmail.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/18/2017
Comment8 comments  |  Read  |  Post a Comment
Survey: Unpatched Windows OS on the Rise
Dark Reading Staff, Quick Hits
Despite the rise in vulnerabilities, the percentage of unpatched Windows operating systems grew in the first quarter compared to the previous year.
By Dark Reading Staff , 5/17/2017
Comment0 comments  |  Read  |  Post a Comment
DocuSign's Brand Used in Phishing Attacks
Dark Reading Staff, Quick Hits
The electronic signature company issued an update alert today that it noticed a rise in phishing attacks last week and this morning.
By Dark Reading Staff , 5/16/2017
Comment0 comments  |  Read  |  Post a Comment
The Wide-Ranging Impact of New York's Cybersecurity Regulations
Mark Sangster, VP and industry security strategist, eSentireCommentary
New York's toughest regulations yet are now in effect. Here's what that means for your company.
By Mark Sangster VP and industry security strategist, eSentire, 5/16/2017
Comment0 comments  |  Read  |  Post a Comment
Study: Rooted Androids, Jailbroken iPhones Found in Enterprises
Dawn Kawamoto, Associate Editor, Dark ReadingNews
A study released today gives greater insight into some of the worst fears for security pros trying to manage employees' BYOD mobile phones.
By Dawn Kawamoto Associate Editor, Dark Reading, 5/16/2017
Comment1 Comment  |  Read  |  Post a Comment
Majority of CEOs Knowingly Raise Risk Level With Their Shadow IT
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Despite the increased risk shadow IT poses to security, a majority of CEOs surveyed say they are willing to take the risk, according to a survey released today.
By Dawn Kawamoto Associate Editor, Dark Reading, 5/16/2017
Comment0 comments  |  Read  |  Post a Comment
Researchers Investigate Possible Connection Between WannaCry & North Korean Hacker Group
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Google, Kaspersky Lab and Symantec all have found common code in the WannaCry malware and that of the nation-state hackers behind the mega breach of Sony.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/15/2017
Comment2 comments  |  Read  |  Post a Comment
Breaches Can Crater Companies' Stock by 5%
Dark Reading Staff, Quick Hits
New Ponemon study shows how breaches can bring a company's stock price down by an average of 5% on the day of the incident.
By Dark Reading Staff , 5/15/2017
Comment0 comments  |  Read  |  Post a Comment
Your Grandma Could Be the Next Ransomware Millionaire
Brian Vecci, Technical Evangelist, Varonis SystemsCommentary
Today's as-a-service technology has democratized ransomware, offering practically anyone with a computer and an Internet connection an easy way to get in on the game.
By Brian Vecci Technical Evangelist, Varonis Systems, 5/15/2017
Comment3 comments  |  Read  |  Post a Comment
'WannaCry' Rapidly Moving Ransomware Attack Spreads to 74 Countries
Dawn Kawamoto, Associate Editor, Dark ReadingNews
A wave of ransomware infections took down a wide swath of UK hospitals and is rapidly moving across the globe.
By Dawn Kawamoto Associate Editor, Dark Reading, 5/12/2017
Comment4 comments  |  Read  |  Post a Comment
8 Notorious Russian Hackers Arrested in the Past 8 Years
Ericka Chickowski, Contributing Writer, Dark Reading
Lesson learned by Russian cybercriminals: Don't go on vacation, it's bad for your freedom to scam.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/12/2017
Comment2 comments  |  Read  |  Post a Comment
'Systemic' Cyberattack Most Likely to Hit Financial, Energy Sectors
Dark Reading Staff, Quick Hits
The financial services industry is among the top five industries that likely face a systemic cyberattack, according to a survey released today.
By Dark Reading Staff , 5/10/2017
Comment1 Comment  |  Read  |  Post a Comment
Hackers Face $8.9 Million Fine for Law Firm Breaches
Dark Reading Staff, Quick Hits
A federal court orders three Chinese nationals to pay $8.9 million in fines and penalties for hacking into two law firms and using stolen confidential information to trade stocks.
By Dark Reading Staff , 5/9/2017
Comment1 Comment  |  Read  |  Post a Comment
10 Free or Low-Cost Security Tools
Kelly Sheridan, Associate Editor, Dark Reading
At a time when many organizations struggle with security funding, open-source tools can help cut costs for certain businesses.
By Kelly Sheridan Associate Editor, Dark Reading, 5/9/2017
Comment0 comments  |  Read  |  Post a Comment
Aflac CISO: Insurance Sector Ramps Up Cyber Defenses
Kelly Sheridan, Associate Editor, Dark ReadingNews
Aflac CISO Tim Callahan discusses ongoing initiatives to stay secure as hackers ramp up attacks on financial services.
By Kelly Sheridan Associate Editor, Dark Reading, 5/8/2017
Comment0 comments  |  Read  |  Post a Comment
DHS Report Outlines Feds' Mobile Security Threats
Dark Reading Staff, Quick Hits
The US Department of Homeland Security sent Congress a study on mobile security threats facing federal government workers as well as recommendations for protection.
By Dark Reading Staff , 5/8/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by hypumysidiv
Current Conversations now thats my boiiiii Blinkbest  
In reply to: sx
Post Your Own Reply
Posted by Kelly Jackson Higgins
Current Conversations Test
In reply to: Re: Hack
Post Your Own Reply
Posted by TimonN774
Current Conversations dobrarobota. 
In reply to: Bravo
Post Your Own Reply
Posted by TimonN774
Current Conversations Good luck.   
In reply to: Hack
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.