Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in February 2016
<<   <   Page 2 / 2
Man Admits To Laundering $19.6 Million in Hacking, Telecom Fraud Scam
Quick Hits  |  2/12/2016  | 
Hacking increasingly being used as a way to enhance a variety of other criminal endeavors.
Cybersecurity & Healthcare: Does Cybersecurity Act Help or Hurt?
Commentary  |  2/12/2016  | 
Without adequate resources, the new Cybersecurity Act of 2015 Act is merely a snapshot in time that does little to safeguard sensitive medical information.
Congress Passes Judicial Redress Act, UK Snoopers' Charter Gets Closer Look
Quick Hits  |  2/11/2016  | 
European citizens win right to sue the Americans over privacy violations, while Britain ponders new ways to commit privacy violations.
3 Flavors of Machine Learning: Who, What & Where
Commentary  |  2/11/2016  | 
To get beyond the jargon of ML, you have to consider who (or what) performs the actual work of detecting advanced attacks: vendor, product or end-user.
5 Reveals About Today's Attack M.O.s From Skype Spying Malware
News  |  2/11/2016  | 
T9000 backdoor is built with many of today's cybercriminal tricks up its sleeves.
5 Big Incident Response Mistakes
News  |  2/11/2016  | 
Failing to have a formal incident response plan is just one of the mistakes organizations make.
The Phishie Awards: (Dis)Honoring The Best Of The Worst Phishing Attacks
Slideshows  |  2/10/2016  | 
From the costly to the clever to the just plain creepy, here are the recent phishing campaigns that have earned our reluctant recognition.
Over 100,000 E-File PINs Fraudulently Accessed In Automated Attack On IRS App
News  |  2/10/2016  | 
Personal data stolen from other sources was used in attack agency says
Bipartisan House Bill Will Seek To Prevent States From Mandating Encryption Backdoors
Quick Hits  |  2/10/2016  | 
ENCRYPT Act aims to stave off efforts being made in California and New York legislatures.
Simplifying Application Security: 4 Steps
Commentary  |  2/10/2016  | 
Its time to leave behind the misconceptions about the cost and effort required by effective application security. Heres how.
Is The Cybersecurity Bubble About To Burst?
News  |  2/10/2016  | 
Cybersecurity stocks are way down in 2016 so far, but venture capital money still flows.
As Dyre Goes Quiet, Focus Turns On Other Banking Trojans
News  |  2/9/2016  | 
Dridex, Gozi, and Shifu are just three of the many malware tools that could replace Dyre, security researchers say.
New White House Cybersecurity Plan Creates Federal CISO
News  |  2/9/2016  | 
Cybersecurity National Action Plan aims to increase federal cybersecurity spending by 35 percent to modernize IT and address skills shortage, IoT.
How (And Why) AppSec Is Important To Your Business
Commentary  |  2/9/2016  | 
WhiteHat founder Jeremiah Grossman and Prevoty founder & CTO Kunal Anand share their perspectives on the past and future of application security.
Chinese Cyberspies Pivot To Russia In Wake Of Obama-Xi Pact
News  |  2/9/2016  | 
Kaspersky Lab has identified a massive uptick in cyber espionage in Russia by 'Chinese-speaking' APTs.
Brazilian Cyberspies In Suits Shake Down Victims With Stolen Company Secrets
News  |  2/9/2016  | 
'Poseidon Group' puts a new spin on cyber-extortion, and operates across land and sea.
Monday Morning Quarterbacking Super Bowl 50: Infosec Edition
Commentary  |  2/8/2016  | 
How to coach your team to victory in the battle to protect corporate data and intellectual property. After all, theres a lot riding on your game, too.
'AlienSpy' Family Openly Sold As Subscription Service
News  |  2/8/2016  | 
Adwind -- a relative of the infamous AlienSpy spyware -- offered as malware-as-a-service to all types of attackers.
What Should Security Cost?
Partner Perspectives  |  2/8/2016  | 
Understanding the economics of information security.
US DOJ, DHS Yet To Confirm Breach, Leak
Quick Hits  |  2/8/2016  | 
Apparent names, job titles, contact information of 9,000 Department of Homeland Security employees posted on Twitter.
10 Shocking New Facts About Ransomware
Slideshows  |  2/8/2016  | 
Ransomware has taken over the cybercriminal world in the last few years and there's no end in sight.
Cybercrime Gangs Blend Cyber Espionage And Old-School Hacks In Bank Heists
News  |  2/8/2016  | 
'Metel,'GCMAN,' and Carbanak's comeback highlight how cybercriminals are now going after bank users and systems with cyber espoinage-type tools and tactics.
Online 'Batman' Takes On Dridex Banking Trojan Operators
News  |  2/5/2016  | 
Several Dridex malware download sites have begun mysteriously serving up antivirus software instead.
A Case Of Mistaken Identity?
Partner Perspectives  |  2/5/2016  | 
The role of BlackEnergy in Ukrainian power grid disruption.
Newly Fired CEO Of Norse Fires Back At Critics
News  |  2/4/2016  | 
Critics maintain that Norse Corp. is peddling threat data as threat intelligence.
Heres How To Protect Against A Ransomware Attack
News  |  2/4/2016  | 
Recovering data encrypted by a ransomware attack is next to impossible, so prevention offers the better approach.
Cybersecurity Smackdown: What Side Are You On?
Commentary  |  2/4/2016  | 
Analytics vs. Encryption. Prevention vs. Detection. Machine Learning: Promise or Hype? The Firewall: Dead or Still Breathing? The sharpest minds in the security industry debate some of the industry's most contentious issues.
New Kid On The Block: Cyber Threat Analyst
Commentary  |  2/4/2016  | 
Drawing from the financial service industry, this new role uses the art of the intelligence cycle to drive efficiency in the security operations center.
The #1 Riskiest Mobile Users Wear Suits
News  |  2/4/2016  | 
Business users top the rankings of those most likely to engage with risky apps and URLs on their smartphones and tablets.
Agriculture, Alternative Energy Could Be Chinese Hackers' Next Targets
News  |  2/3/2016  | 
Perhaps Anthem and Premera breaches were not just about stealing PII, but about researching the ins and outs of Western healthcare systems, CrowdStrike's annual global threat report says.
Lights Out: Not So Fast
News  |  2/3/2016  | 
Author and famed broadcast journalist Ted Koppel's new bestseller warns of a 'likely' nationwide and devastating blackout of the US grid at the hands of hackers, but some government and utility industry officials disagree.
Passwords, Email Addresses, Were Most Stolen Data In 2015
Quick Hits  |  2/3/2016  | 
Analysis of public data breaches finds US and UK represented more than 45% of all reported breaches last year, and major energy firms make the list of most multiple breaches.
Zero Trust: Now A Critical Foundation For Securing Mobile
Commentary  |  2/3/2016  | 
No longer willing to rely on an OS that doesn't provide the security features they need, developers are taking steps to secure apps, defend data, and protect users.
7 Signs of Infosec's Groundhog Day Syndrome
Slideshows  |  2/2/2016  | 
Irritations that plague security pros day in and day out.
EU, US Agree On New Data Transfer Pact, But Will It Hold?
News  |  2/2/2016  | 
So long Safe Harbor, hello 'Privacy Shield.'
As Good As They're Getting, Analytics Don't Inherently Protect Data
Commentary  |  2/2/2016  | 
It is only a matter of time before your system is breached, and when your data is lost, analytics won't help you.
Encryption Has Its Place But It Isnt Foolproof
Commentary  |  2/2/2016  | 
Most encrypted data is unencrypted at some point in its lifecycle -- and the bad guys are pretty good at finding the one window left open.
Macro Malware Resurgence Highlighted By Kasidet Outbreak
News  |  2/2/2016  | 
Also known as Neutrino, this piece of malware is another case of Office macro malaise.
Cybercrime Doesn't Pay As Much As You'd Think
News  |  2/1/2016  | 
Legit cybersecurity professionals typically make more than the average cybercriminal, a new survey says.
First Hacker Arrested for CyberTerror Charges Arrives In American Court
Quick Hits  |  2/1/2016  | 
Kosovo citizen faces a maximum sentence of 35 years in prison for hacking and providing material support to ISIS.
The Cybersecurity Talent You Seek May Be In-House
News  |  2/1/2016  | 
IT staff in many cases are already performing security-related work -- with proper training, they could be converted to the security team.
IEEE Anti-Malware Support Service Goes Live
Commentary  |  2/1/2016  | 
Through the collaborative effort of major players in the computer security industry, organizations now have two new tools for better malware detection.
<<   <   Page 2 / 2


44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9351
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. If an unauthenticated attacker makes a POST request to /tools/developerConsoleOperations.jsp or /isomorphic/IDACall with malformed XML data in the _transaction parameter, the server replies with a verbose error showing where the application resides (the a...
CVE-2020-9352
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. Unauthenticated exploitation of blind XXE can occur in the downloadWSDL feature by sending a POST request to /tools/developerConsoleOperations.jsp with a valid payload in the _transaction parameter.
CVE-2020-9353
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) loadFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL is affected by unauthenticated Local File Inclusion via directory-traversal sequences in the elem XML ...
CVE-2020-9354
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) saveFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL allows an unauthenticated attacker to overwrite files via vectors involving an XML comment and /.. pat...
CVE-2020-9355
PUBLISHED: 2020-02-23
danfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled.