News & Commentary

Content posted in February 2014
Page 1 / 3   >   >>
Today's Network Security Challenges: No Easy Answers
News  |  2/28/2014  | 
The BYOD trend and proliferation of mobile devices are making life hard for security teams, but solutions are elusive, panelists say at RSA Conference 2014
Fresh Target Breach Cards Hitting Black Market
News  |  2/28/2014  | 
A Bitcoin-powered marketplace is selling stolen card data in small batches, offering card validity guarantees, an RSA presentation reveals.
DDoS Attack! Is Regulation The Answer?
Commentary  |  2/28/2014  | 
Four security experts weigh in on why theres been little progress in combating DDoS attacks and how companies can start fighting back.
Boeing Unveils Self-Destructing Smartphone
Quick Hits  |  2/28/2014  | 
Rugged and super-secure Boeing Black smartphone targets government agencies involved with defense and homeland security
Verizon Shares Glimpse Into Upcoming 2014 Data Breach Investigations Report
News  |  2/28/2014  | 
Breach data for upcoming Verizon report comes from some 50 contributing organizations from 95 nations, including Eastern European and Latin American CERTs
Big Data A Big Focus Of Security Analytics Products
News  |  2/27/2014  | 
At the RSA Conference this week, vendors pitched big the importance of properly leveraging big data to improve security
IBM Software Vulnerabilities Spiked In 2013
News  |  2/27/2014  | 
Most code flaws still involve non-Microsoft products, and overall patching speed has improved, study presented at RSA conference finds
5 Reasons Security Certifications Matter
Quick Hits  |  2/27/2014  | 
There's a lot of buzz around how certs aren't important. I'm calling BS, and here's why
IBM Software Vulnerabilities Spiked In 2013
News  |  2/27/2014  | 
Most code flaws still involve non-Microsoft products, and overall patching speed has improved, study presented at RSA conference finds.
Bitcoin-Stealing Malware: Now In 100 Flavors
News  |  2/27/2014  | 
Specialized malware empties electronic wallets of digital currency, and antivirus often misses it, say researchers at RSA Conference.
More Than 100 Flavors Of Malware Are Stealing Bitcoins
News  |  2/26/2014  | 
Specialized form of malware empties electronic wallets of digital currency, and antivirus often misses it
Apple Patches Mavericks SSL Flaw: Update Now
News  |  2/26/2014  | 
Security update patches "goto fail" flaw that enables attackers to intercept communications, but won't help the 23% of Macs running older OS
RSA: Juniper Security Chief Blasts Apathy
News  |  2/26/2014  | 
In RSA keynote, Juniper Networks security exec Nawaf Bitar urges more innovation and active defense.
Compliance Is Not Hard
Commentary  |  2/26/2014  | 
Compliance requires a new set of healthy habits and the self-discipline to make those habits stick
Juniper Security Chief Takes Swipe At Security Apathy
News  |  2/26/2014  | 
RSA keynote urges more innovation and active defense
Apple Patches Mavericks SSL Flaw: Update Now
News  |  2/26/2014  | 
Security update patches "goto fail" flaw that enables attackers to intercept communications, but won't help the 23% of Macs running older OS X.
RSA Chairman: NSA Work Is 'Public Record'
News  |  2/26/2014  | 
Art Coviello calls for global intelligence community reforms, says RSA's work with NSA was never secret.
Lessons Learned From The Target Breach
Commentary  |  2/26/2014  | 
The time is ripe for organizations to take a long, hard look at how they manage employee access and secure sensitive data in cloud environments
Microsoft Beefs Up EMET
Quick Hits  |  2/25/2014  | 
Early release of anti-exploit tool shuts down bypass methods created by Bromium Labs
Coviello: RSA Security's Work With NSA 'A Matter Of Public Record'
News  |  2/25/2014  | 
RSA chairman calls for global intelligence community reforms, spinning IAD off from NSA
Apple SSL Vulnerability: 6 Facts
News  |  2/25/2014  | 
SSL vulnerability that's been patched in iOS -- but not yet for OS X -- lets attackers intercept email and FaceTime communications, plus push malicious software updates
NSA Spying Scandal Darkens Cloud Discussions At RSA
News  |  2/25/2014  | 
From Europe's efforts to create regulations for data localization to worries over the security of the cloud, the leaks of the past eight months have cast a shadow over cloud providers
Apple SSL Vulnerability: 6 Facts
News  |  2/25/2014  | 
SSL vulnerability that's been patched in iOS -- but not yet for OS X -- lets attackers intercept email and FaceTime communications, plus push malicious software updates.
Cisco-Sourcefire Integration Takes Shape
News  |  2/25/2014  | 
Integration includes adding Sourcefire's AMP technology into its email and Web security appliances
Healthcare Devices: Security Researchers Sound Alarms
Quick Hits  |  2/25/2014  | 
Default usernames, weak passwords, and widespread Windows XP Embedded systems are cause for concern, SANS Institute researchers say
How I Secure My Personal Cloud
Commentary  |  2/24/2014  | 
As global cloud traffic grows exponentially, IT pros face the daunting task of securing their personal cloud, data, and workloads.
Researchers Bypass Protections In Microsoft's EMET Security Tool
News  |  2/23/2014  | 
Bromium Labs researchers create exploit that the Enhanced Mitigation Experience Toolkit (EMET) 4.1 can't detect
Is The Hypervisor Security's Goldilocks Zone?
News  |  2/21/2014  | 
RSA presentation to put virtualization forward as a tool to fix security's architectural problems
Solving The Security Workforce Shortage
Commentary  |  2/21/2014  | 
To solve the skills shortage, the industry will need to attract a wider group of people and create an entirely new sort of security professional
Study: 96 Percent Of Applications Have Security Vulnerabilities
Quick Hits  |  2/20/2014  | 
Nearly all applications tested have security flaws, Cenzic study says; information leakage is chief culprit
Vulnerability In Tinder Dating App Exposed Users' Location
News  |  2/20/2014  | 
Security flaw made it possible to pinpoint users of Tinder online dating app within 100 feet, researchers say
IT Pros Okay With Government's Role In Cybersecurity
Quick Hits  |  2/20/2014  | 
Most U.S. IT pros see feds' involvement in security a positive, new Dell survey shows
Microsoft Issues Emergency Fix For Internet Explorer Zero-Day
News  |  2/20/2014  | 
'Fix-it' shipped in the wake of at least two targeted attack campaigns exploiting a newly found bug in IE10
Boutique Malware & Hackers For Hire
Commentary  |  2/20/2014  | 
Heads up! Small groups of cyber-mercenaries are now conducting targeted hit-and-run attacks for anyone willing to pay the price.
Securing Data In 4 (Relatively) Easy Steps
Commentary  |  2/20/2014  | 
The key to success in information security is finding the 'right' information in all the data you aim to protect.
Windows Crash Reports Reveal New APT, POS Attacks
News  |  2/20/2014  | 
Researchers discover zero-day attacks after studying the contents of various "Dr. Watson" error reports.
Microsoft Windows Crash Reports Reveal New APT, POS Attacks
News  |  2/19/2014  | 
Researchers discover zero-day attacks after studying the contents of various "Dr. Watson" error reports
U.S. Running Out Of Allies On Cyber Battlefield
News  |  2/19/2014  | 
International cyber policy and enforcement, and ownership over the Internet are thorny topics that will be tackled at the 2014 RSA Conference next week
WebView Exploit Affects Most Android Phones
News  |  2/19/2014  | 
Critical bug affects devices running Jelly Bean (4.2) and earlier Android OSs, including fully updated versions of Google Glass, says Metasploit.
New Zeus Variant Targets Salesforce.com
News  |  2/19/2014  | 
New attack shows the adaptability of Zeus and the challenges of policing an ever-expanding network perimeter
'Connect': A Modern Approach To Mobile, Cloud Identity
Commentary  |  2/19/2014  | 
A new protocol from the OpenID Foundation promises enterprises federated single sign-on that can scale.
5 Tactics To Help Triage Patching
News  |  2/19/2014  | 
Refine risk measurements to better prioritize the patching of vulnerabilities
Former Israeli Military Intel Agents Launch Security Startup
Quick Hits  |  2/19/2014  | 
Cybereason focuses on attacker's activity, behavior
FBI, International Law Enforcement Officials Share Insights On Fighting Cybercrime
News  |  2/18/2014  | 
Officials from the FBI, Netherlands, Interpol, and other agencies on the fight to track and catch cybercriminals around the globe
Bye, Bitcoin: Criminals Seek Other Crypto Currency
News  |  2/18/2014  | 
Law enforcement crackdowns, hack attacks, and market volatility drive Russian fraudsters to mint their own virtual currency systems.
FIDO Alliance Releases Authentication Standards, Unveils Products
News  |  2/18/2014  | 
Proponents say the new specifications will pave the way for the replacement of passwords, which are frequently lost, stolen, or hacked.
Why FIDO Alliance Standards Will Kill Passwords
Why FIDO Alliance Standards Will Kill Passwords
Dark Reading Videos  |  2/18/2014  | 
Phillip Dunkelberger of Nok Nok Labs tells why the time is finally ripe for a password-free computing experience.
FIDO Alliance Publishes Authentication Standards; First Products Unveiled
Quick Hits  |  2/17/2014  | 
FIDO Alliance issues specs for "authentication plumbing;" Nok Nok ships first implementation
Why FIDO Alliance Standards Will Kill Passwords
Why FIDO Alliance Standards Will Kill Passwords
Dark Reading Videos  |  2/17/2014  | 
Phillip Dunkelberger of Nok Nok Labs tells why the time is finally ripe for a password-free computing experience.
Abusing Cloud Services For Cybercrime
News  |  2/14/2014  | 
At the upcoming RSA conference, researchers will discuss how a lack of anti-automation protections allow attackers to take advantage of free cloud services
Page 1 / 3   >   >>


13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.