Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in March 2015
Page 1 / 2   >   >>
3 Big-Picture Themes CISOs Should Track At Interop
News  |  3/31/2015  | 
Security programming is great, but Interop offers opportunity to learn about larger trends that will impact security in the coming year
30% Of Companies Would Pay Ransoms To Cybercriminals
News  |  3/31/2015  | 
Factor in under-reporting and the growing sophistication of ransomware -- like PacMan's social engineering scheme -- and the number might be higher.
Healthcare Is Ignoring Cyber Risk Intel, Academia Even Worse
Commentary  |  3/31/2015  | 
Healthcare and other sectors are indolently ignoring the process of gathering and using high-level intelligence to focus cyber defenses. Heres proof.
Lebanon Believed Behind Newly Uncovered Cyber Espionage Operation
News  |  3/31/2015  | 
Middle East, US, and other targets hit in nearly three-year-old 'Volatile Cedar' cyber attack campaign.
British Airways The Latest Loyalty Program Breach Victim
News  |  3/30/2015  | 
Who needs to steal credit cards when you can get airfare and luxury items for free?
Study: Network Team's Security Role On The Rise
Quick Hits  |  3/30/2015  | 
New data shows how network engineers and other members of the network team are teaming up with their counterparts in security.
Hacking Back: Two Wrongs Dont Make A Right
Commentary  |  3/30/2015  | 
Heres the critical issue: Do you want to risk engaging your company in an ego-fueled war of revenge, or do you want to cut the bad guys off at the pass?
7 Bugs, Breaches, & Compromises To Rock 2015 (So Far)
Slideshows  |  3/30/2015  | 
The year's started off with a bang; will we hear risk management pros whimper?
Defending Cyber-Physical Systems from Attack Chains
Partner Perspectives  |  3/30/2015  | 
A strong defense against compromise involves three layers: hardening devices, securing communications, and monitoring behavior.
Hotel Router Vulnerability A Reminder Of Untrusted WiFi Risks
News  |  3/27/2015  | 
A flaw in a popular router product may have exposed millions of hotel guests, researchers from Cylance say.
Cyber Hunting: 5 Tips To Bag Your Prey
Commentary  |  3/26/2015  | 
Knowing the lay of the land and where attackers hide is a key element in hunting, both in nature and in the cyber realm.
SSL/TLS Suffers 'Bar Mitzvah Attack'
News  |  3/26/2015  | 
Researcher at Black Hat Asia shows how attackers could abuse a known-weak crypto algorithm to steal credentials and other data from encrypted communications.
SDN Shows Promise For Security
News  |  3/26/2015  | 
Improved security is emerging as a major reason for adopting software-defined networking, but concerns about potential SDN risks persist.
Researchers Use Heat To Breach Air-Gapped Systems
News  |  3/25/2015  | 
BitWhisper project is part of ongoing air gap security research at Israel's Ben-Gurion University.
FBI Threat Intelligence Cyber-Analysts Still Marginalized In Agency
News  |  3/25/2015  | 
Despite good progress, 9/11 Review Commission says that analysts could have a greater impact on FBI counter-terrorism activities if they had more domain awareness, forensics capabilities, and were more empowered to question agents.
Preparing for a Breach: The Charge of the Security Brigade
Partner Perspectives  |  3/25/2015  | 
Automation is key to shorter response times and better containment.
The Internet Of Bring-Your-Own Things
Commentary  |  3/25/2015  | 
Devices and interconnected systems are finding a foothold not only in our homes but in mainstream organizations. Here are three tips to mitigate the risk.
Typical Users Know Less About Mobile Privacy Than They Think
News  |  3/24/2015  | 
New Mobile Privacy IQ survey shows a disconnect between perception and practice.
New Secure Online Check-Out Tech Goes For Less Friction, More Biometrics
News  |  3/24/2015  | 
BioCatch, Zumigo, and Alibaba release tools to help merchants avoid those pesky charge-back costs.
Retailers Adopt Intel-Sharing Portal Used By Banks
News  |  3/24/2015  | 
Th Retail Cyber Intelligence Sharing Center (R-CISC) is working with the Financial Services ISAC (FS-ISAC) on its new threat intelligence-sharing platform.
Networked Healthcare: Connecting You, Your Devices, and Your Health Practitioners
Partner Perspectives  |  3/24/2015  | 
Technology developers and policy makers must work closer with the security sector to ensure that innovation leads to real enablement, not cybercrime.
Educating The Cyberwarriors Of The Future
Commentary  |  3/24/2015  | 
If I have to choose between hiring a university-educated CompSci grad or an IT specialist strong in sysadmin, networking or programming, I will pick the IT specialist every time.
Will POSeidon Preempt BlackPOS?
News  |  3/23/2015  | 
Research from Cisco Talos uncovers newly evolved POS malware with more sophistication than BlackPOS and similarities to Zeus for camouflage.
Worst Sports-Related Passwords
News  |  3/23/2015  | 
March Madness and Spring Training underway. NFL draft and NBA playoffs soon to come. Your users may be even more tempted than ever to create some of these bad sports-related passwords
When DDoS Isn't All About Massive Disruption
News  |  3/23/2015  | 
New data shows prevalence of often-undetectable DDoS attacks aimed at quietly wreaking havoc on the network while performing data exfiltration and other attacks.
Protect Your Web Applications
Partner Perspectives  |  3/23/2015  | 
Reverse proxies are critical to shield Web apps from external attacks.
Context: Finding The Story Inside Your Security Operations Program
Commentary  |  3/23/2015  | 
Whats missing in todays chaotic, alert-driven incident response queue is the idea of a narrative that provides a detailed understanding of how an attack actually unfolds.
Rush To Release Resulting In Vulnerable Mobile Apps
News  |  3/20/2015  | 
IT organizations overlooking security in their haste to crank out mobile apps, Ponemon Institute report finds.
The Clinton Email Kerfuffle & Shadow IT
Commentary  |  3/20/2015  | 
For security pros the issue is not government transparency. It's the fact that users, regardless of seniority, will always pick convenience over security.
Frenemies Of The C-Suite: CSO, CIO, CRO, CPO
News  |  3/19/2015  | 
Sometimes the security, IT, risk, and privacy offices just can't get along.
Target To Settle Data Breach Lawsuit For $10 Million
News  |  3/19/2015  | 
Individuals who can prove financial damage can receive up to $10,000 under proposed deal.
Risky Business: Why Monitoring Vulnerability Data Is Never Enough
Commentary  |  3/19/2015  | 
Keeping tabs on open source code used in your organizations applications and infrastructure is daunting, especially if you are relying solely on manual methods.
New Security Mindset: Focus On The Interior
News  |  3/18/2015  | 
Chief privacy officer Jason Straight shares his insights on why organizations are struggling to stop the breach wave -- and manage the aftermath.
Healthcare Breaches Like Premera First Stage Of Bigger Attacks?
News  |  3/18/2015  | 
With three new healthcare breaches announced this week, but no reported misuse of stolen data, what plans might attackers have for the identity records they pilfered from CHS, Anthem, Premera and others?
The Bot Threat For the Rest of Us: Application-Layer Attacks
Commentary  |  3/18/2015  | 
Bots are getting craftier by the day so you may not even know you have a problem.
The Anatomy of Advanced Persistent Threats
Partner Perspectives  |  3/18/2015  | 
The only way to keep intruders away is to use multiple security mechanisms.
Two More Health Insurers Report Data Breach
Quick Hits  |  3/17/2015  | 
Premera Blue Cross and LifeWise say 11.25 million customers' records might have been exposed.
The 7 Best Social Engineering Attacks Ever
Slideshows  |  3/17/2015  | 
Seven reminders of why technology alone isn't enough to keep you secure.
Microsoft Warns Of Phony Windows Live Digital Certificate
Quick Hits  |  3/17/2015  | 
Unauathorized SSL certificate for 'live.fi' could be used for man-in-the-middle, phishing attacks, Microsoft says.
The End of Pen Testing As We Know It?
Commentary  |  3/17/2015  | 
It's time to expand the scope of penetration tests beyond the periphery of the enterprise network.
BlackBerry Looks To Revive Relevance By Doubling Down On Security
News  |  3/17/2015  | 
Company launches new uber-secure tablet built on Samsung hardware, teams with IBM.
10 Ways To Measure IT Security Program Effectiveness
Slideshows  |  3/16/2015  | 
The right metrics can make or break a security program (or a budget meeting).
Most Companies Expect To Be Hacked In The Next 12 Months
News  |  3/16/2015  | 
Security spending increases, while confidence in stopping cyber attacks decreases, new report shows.
Yahoo's One-Time Passwords Have Security Experts Divided
News  |  3/16/2015  | 
Better protection from keyloggers, but you'd better not lose your phone, Yahoo users.
Dark Reading Radio: Security Pros At Risk Of Being Criminalized
Commentary  |  3/16/2015  | 
ICYMI: Check out Dark Reading Radio's recent broadcast and discussion about the pitfalls of new government efforts to fight bad hackers that could ultimately hurt the good guys.
Endpoints, Gateways, and Networks: Teamwork Is Better Than Lone Rangers
Partner Perspectives  |  3/16/2015  | 
Security vendors have a common goal when it comes to protecting their customers from danger. Whats missing is a common language and protocols for how and what to share.
7 Deadly Sins Of Security Policy Change Management
Commentary  |  3/16/2015  | 
Mitigating these deadly sins requires process, visibility and automation. Its an effort that will improve security and increase business agility.
Hackers Breaking New Ground With Ransomware
News  |  3/13/2015  | 
The tools and tactics being used to go after victims reveal growing sophistication, and gamers need to look out, security researchers say.
Has Security Ops Outlived Its Purpose?
Commentary  |  3/13/2015  | 
CISOs will need more than higher headcounts and better automation tools to solve today's security problems.
ISACs Demystified
News  |  3/12/2015  | 
How some intelligence-sharing organizations operate in the face of today's threat landscape.
Page 1 / 2   >   >>


Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.