IoT
News & Commentary
Siemens Leads Launch of Global Cybersecurity Initiative
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
The new 'Charter of Trust' aims to make security a key element of the digital economy, critical infrastructure.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/16/2018
Comment0 comments  |  Read  |  Post a Comment
As Primaries Loom, Election Security Efforts Behind Schedule
Dark Reading Staff, Quick Hits
While federal agencies lag on vulnerability assessments and security clearance requests, the bipartisan Defending Digital Democracy Project releases three new resources to help state and local election agencies with cybersecurity, incident response.
By Dark Reading Staff , 2/13/2018
Comment1 Comment  |  Read  |  Post a Comment
Ukraine Power Distro Plans $20 Million Cyber Defense System
Dark Reading Staff, Quick Hits
After NotPetya and severe blackouts, Ukrenergo responds with an investment in cybersecurity.
By Dark Reading Staff , 2/6/2018
Comment0 comments  |  Read  |  Post a Comment
Mastering Security in the Zettabyte Era
Marc Wilczek, Digital Strategist & CIO AdvisorCommentary
Many businesses are ill-equipped to deal with potential risks posed by billions of connected devices, exponential data growth, and an unprecedented number of cyber threats. Here's how to prepare.
By Marc Wilczek Digital Strategist & CIO Advisor, 2/5/2018
Comment0 comments  |  Read  |  Post a Comment
IoT Botnets by the Numbers
Ericka Chickowski, Contributing Writer, Dark Reading
IoT devices are a botherder's dream attack-vector.
By Ericka Chickowski Contributing Writer, Dark Reading, 1/31/2018
Comment6 comments  |  Read  |  Post a Comment
Strava Fitness App Shares Secret Army Base Locations
Dark Reading Staff, Quick Hits
The exercise tracker published a data visualization map containing exercise routes shared by soldiers on active duty.
By Dark Reading Staff , 1/29/2018
Comment10 comments  |  Read  |  Post a Comment
Endpoint and Mobile Top Security Spending at 57% of Businesses
Dark Reading Staff, Quick Hits
Businesses say data-at-rest security tools are most effective at preventing breaches, but spend most of their budgets securing endpoint and mobile devices.
By Dark Reading Staff , 1/26/2018
Comment1 Comment  |  Read  |  Post a Comment
10 Costs Your Cyber Insurance Policy May Not Cover
Kelly Sheridan, Associate Editor, Dark Reading
All the things you might think are covered but that don't actually fall under most policies.
By Kelly Sheridan Associate Editor, Dark Reading, 1/23/2018
Comment6 comments  |  Read  |  Post a Comment
Feds Team with Foreign Policy Experts to Assess US Election Security
Steve Zurier, Freelance WriterNews
Expert panel lays out potential risks for the 2018 election cycle and beyond
By Steve Zurier Freelance Writer, 1/18/2018
Comment1 Comment  |  Read  |  Post a Comment
Majority of Companies Lack Sufficient IoT Policy Enforcement Tools
Dark Reading Staff, Quick Hits
Shortfall exists despite nearly all global technology enterprise companies having security policies to manage IoT devices.
By Dark Reading Staff , 1/12/2018
Comment0 comments  |  Read  |  Post a Comment
Privacy: The Dark Side of the Internet of Things
Ryan Barrett, VP of Security and Privacy at IntermediaCommentary
Before letting an IoT device into your business or home, consider what data is being collected and where it is going.
By Ryan Barrett VP of Security and Privacy at Intermedia, 1/11/2018
Comment1 Comment  |  Read  |  Post a Comment
The Internet of (Secure) Things Checklist
Rinki Sethi, Senior Director of Security Operations and Strategy of  Palo Alto NetworksCommentary
Insecure devices put your company at jeopardy. Use this checklist to stay safer.
By Rinki Sethi Senior Director of Security Operations and Strategy of Palo Alto Networks, 1/4/2018
Comment2 comments  |  Read  |  Post a Comment
In Mobile, It's Back to the Future
Michael Downs, Director of Telecoms Security, EMEA, at Positive TechnologiesCommentary
The mobile industry keeps pushing forward while overlooking some security concerns of the past.
By Michael Downs Director of Telecoms Security, EMEA, at Positive Technologies, 1/3/2018
Comment0 comments  |  Read  |  Post a Comment
A Pragmatic Approach to Fixing Cybersecurity: 5 Steps
Mike McConnell & Patrick Gorman, Mike McConnell & Patrick GormanCommentary
The digital infrastructure that supports our economy, protects our national security, and empowers our society must be made more secure, more trusted, and more reliable. Here's how.
By Mike McConnell & Patrick Gorman Mike McConnell & Patrick Gorman, 1/3/2018
Comment1 Comment  |  Read  |  Post a Comment
The Argument for Risk-Based Security
Renaud Deraison, CTO & Co-Founder, TenableCommentary
A scanner can identify a vulnerability, but only a deep understanding of cyber exposure will tell you about the seriousness of that risk. Here's how and why.
By Renaud Deraison CTO & Co-Founder, Tenable, 1/2/2018
Comment1 Comment  |  Read  |  Post a Comment
Hacker Targeted Huawei Router 0-Day in Attempt to Create New Mirai Botnet
Dark Reading Staff, Quick Hits
Thousands of attempts have been made to exploit a zero-day vulnerability in the Huawei home router HG532.
By Dark Reading Staff , 12/27/2017
Comment0 comments  |  Read  |  Post a Comment
2017 Security Predictions through the Rear Window
Dave Lewis, Global Security Advocate, AkamaiCommentary
If you're going to forecast the future, go big.
By Dave Lewis Global Security Advocate, Akamai, 12/26/2017
Comment0 comments  |  Read  |  Post a Comment
Network Printer & Scanner Spoofing Campaign Targets Millions
Dark Reading Staff, Quick Hits
Cybercriminals distribute malicious email attachments purportedly coming from three common brands of network printer-scanner devices.
By Dark Reading Staff , 12/22/2017
Comment1 Comment  |  Read  |  Post a Comment
CISO Holiday Miracle Wish List
Ericka Chickowski, Contributing Writer, Dark Reading
If CISOs could make a wish to solve a problem, these would be among the top choices.
By Ericka Chickowski Contributing Writer, Dark Reading, 12/22/2017
Comment1 Comment  |  Read  |  Post a Comment
Why Network Visibility Is Critical to Removing Security Blind Spots
Zeus Kerravala, Founder and Principal Analyst, ZK ResearchCommentary
You can't secure what you can't see. Here are four ways to shine a light on the dark spaces of your corporate infrastructure.
By Zeus Kerravala Founder and Principal Analyst, ZK Research, 12/21/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
From DevOps to DevSecOps: Structuring Communication for Better Security
Robert Hawk, Privacy & Security Lead at xMatters,  2/15/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.