Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in May 2016
<<   <   Page 2 / 3   >   >>
Presidential Campaigns Hit By Hackers, Says US Intelligence Chief
Quick Hits  |  5/19/2016  | 
Clapper says hacking likely to intensify; officials working with campaigns to secure their networks.
Time To Treat Sponsors Of Ransomware Campaigns As Terrorists, Lawmaker Says
News  |  5/18/2016  | 
Fighting ransomware at an international level will require cooperation between law enforcement and State Department, Sen. Lindsey Graham, said at a Senate hearing.
Domain Abuse Sinks Anchors Of Trust
News  |  5/18/2016  | 
Georgia Tech researchers create algorithm to help detect rising DNS domain abuse by cybercriminals, nation-state actors.
Survey: Customers Lose Trust In Brands After A Data Breach
Quick Hits  |  5/18/2016  | 
Survey by FireEye highlights customer reluctance to continue with service providers with weak cybersecurity.
Vietnam Bank Target Of Failed Cyberattack In December
Quick Hits  |  5/18/2016  | 
Top Vietnamese central bank official says attempt to transfer $1.36 million to Slovenian bank was an isolated incident.
Cloud SLAs: What Everyone Should Know
Partner Perspectives  |  5/18/2016  | 
13 questions to ask your service providers to better understand their service offerings and your risks.
'Skimer' Stealing Money, Card Data From ATMs Around Globe
News  |  5/18/2016  | 
Windows-based ATMs are vulnerable to this new variant of ATM malware, Kaspersky Lab says.
Cybercrooks Think More Like CEOs And Consultants Than You Think
News  |  5/17/2016  | 
Speaking the language of the board room, and understanding things like value chain and SWOT analysis, might help you speak the language of the adversary.
GhostShell Leaks Data From 32 Sites In Light Hacktivism Campaign
Quick Hits  |  5/17/2016  | 
After a few months of silence, the Romanian hacktivist is back to expose the dangers of leaving FTP ports unprotected.
Ukrainian Pleads Guilty To Stealing Press Releases For Insider Trading
Quick Hits  |  5/17/2016  | 
In largest known cyber securities fraud to date, hackers and traders made $30 million from unreleased press releases.
Surviving Infosec: Keep Calm & Make Time For Yourself
Commentary  |  5/17/2016  | 
Nine simple but powerful ways to break out of those painful states of mind when you cant leave the office.
1.4 Billion Androids Open To Spying Via New TCP Flaw
News  |  5/16/2016  | 
Flaw first described by researchers to affect web servers also leaves mobile devices exposed.
That Time I Got Publicly Hacked
Commentary  |  5/16/2016  | 
In honor of Dark Reading's 10th anniversary, I embarrass myself one more time for posterity.
Dark Reading Radio: How To Get The Most Out Of Your Security Budget
Commentary  |  5/16/2016  | 
Join us on Wednesday, May 18 at 1pmEDT/10am PDT, for a discussion with security executives on how to prioritize and manage your IT security budget.
Internet Of Things: 50 Billion Connected Targets
Partner Perspectives  |  5/16/2016  | 
We must work to minimize attackers incentive and opportunity while maximizing their risk.
Tennessee Man Found Guilty Of Mitt Romney Tax Return Hack Scheme
Quick Hits  |  5/16/2016  | 
Convicted for attempt to blackmail PwC accounting firm with release of former U.S. Presidential candidate's pre-2010 tax returns.
5 Secret Habits Of Highly Successful Network Security Programs
News  |  5/16/2016  | 
The key ingredients to network cybersecurity success and how they improve security results.
CISO Playbook: Games Of War & Cyber Defenses
Commentary  |  5/16/2016  | 
Limiting incident response planning to hypothetical table-top scenarios is far too risky in todays threat environment. But with cyberwar gaming, you can simulate the experience of a real attack.
Bangladesh Bank Theft: New York Fed Stands By Transfer Procedures
Quick Hits  |  5/16/2016  | 
Bank replies to US lawmaker query whether transfer of funds should have been blocked.
Encryption 101: Covering the Bases
Slideshows  |  5/13/2016  | 
Heres an overview of the key encryption types youll need to lock down your companys systems.
SWIFT Confirms Cyber Heist At Second Bank; Researchers Tie Malware Code to Sony Hack
News  |  5/13/2016  | 
Operator of global secure messaging system for banks warns of highly adaptive campaign
'Pawn Storm' APT Campaign Rolls On With Attacks in Germany, Turkey
News  |  5/13/2016  | 
Offices of German chancellor Angela Merkel among those targeted in recent attacks, Trend Micro says.
US, China Hold Cyber Talks For First Time After September Deal
Quick Hits  |  5/13/2016  | 
Meeting was part of pledge between heads of both nations for joint action on growing cyberspace concerns.
Bangladesh Bank Theft: SWIFT CEO Rejects Theory Of Loopholes In Network
Quick Hits  |  5/13/2016  | 
Leibbrandt says customer fraud is the likely explanation for the $81 Million bank heist.
Happy Blame Someone Else Day
Slideshows  |  5/13/2016  | 
In cybersecurity, each day a company experiences a data breach, it appears to be #BlameSomeoneElseDay
Why Online Video Gaming Will Be The Next Industry Under Cyber Attack
Commentary  |  5/13/2016  | 
As more money flows into games, criminals are targeting this new and lucrative market with the tools and techniques they once used to hack online banks and Internet retailers.
Call Centers In The Bullseye
News  |  5/12/2016  | 
Cheap set-ups, economic recession, and the US rollout of chip-and-PIN technology, all contribute to dramatic increase in call center fraud.
IBM Watson Will Help Battle Cyberattacks
News  |  5/12/2016  | 
IBM and leading universities will train IBM Watson to discover hidden patterns and cyber threats.
Verizon DBIR Puzzler Solved With Meghan Trainor And Cyber Pathogens
News  |  5/12/2016  | 
All about that puzzler's paradise that is the 2016 Annual Verizon Data Breach Investigations Report cover contest.
6 Shocking Intellectual Property Breaches
Slideshows  |  5/12/2016  | 
Not all breaches involve lost customer data. Sometimes the most damaging losses come when intellectual property is pilfered.
Enterprises Must Consider Privacy Concern For Biometrics
News  |  5/12/2016  | 
On-server storage and processing of biometric authentication presents a host of regulatory and corporate responsibility issues.
Phishing Fraud BECkons: Will You Fall Victim?
Commentary  |  5/12/2016  | 
Why one company got caught in a Business Email Compromise (BEC) Attack -- and how yours can avoid the same fate.
Walmart Sues Visa Over New Debit Card Rules
Quick Hits  |  5/12/2016  | 
Forced to accept unsecure signatures instead of PIN with new chip-enabled cards, says retail giant.
Startup XOR Offers Free Protection For Hacked Organizations
Quick Hits  |  5/12/2016  | 
Compromised Identity Exchange designed to shield victims from identity theft and more.
Healthcare Suffers Estimated $6.2 Billion In Data Breaches
News  |  5/12/2016  | 
Nearly 90 percent of healthcare organizations were slammed by a breach in the past two years.
Windows 0-Day Exploit Used In Recent Wave Of PoS Attacks
News  |  5/11/2016  | 
Privilege-escalation exploit was part of a malware campaign that impacted more than 100 organizations earlier this year, according to FireEye.
Dark Reading Not Actually A Sign Of The Apocalypse
Commentary  |  5/11/2016  | 
My initial threat assessment of Dark Reading was entirely inaccurate.
Security Innovation: Driven By Necessity, Fueled By Interaction
Partner Perspectives  |  5/11/2016  | 
If we want to get ahead of the bad guys, we need to come up with new ways of approaching the security problem and transform our security solutions from reactive to proactive and predictive.
Investigations Into Bangladesh Bank Heist Indicate Inside Job
Quick Hits  |  5/11/2016  | 
FBI suspects bank worker may have acted as accomplice in the $81 Million theft.
British Law Enforcement Agency Loses Bid To Get Passwords From Hacker Lauri Love
Quick Hits  |  5/11/2016  | 
Judge says National Crime Agency should use normal police powers -- not civil action -- to access information, allegedly hacked from US Army, NASA and US Federal Reserve networks.
6 Eye-Opening Stats About Endpoint Device Health
News  |  5/10/2016  | 
New report shows state of endpoint patching and updates among a sample of 2 million devices.
What Makes Next-Gen Endpoint Protection Unique?
Slideshows  |  5/10/2016  | 
Here are five critical factors you need to know about today's new breed of endpoint protection technology.
Man Pleads Guilty To Hacking, Stealing Information From Celebrities
Quick Hits  |  5/10/2016  | 
Bahamian to be sentenced by US court for stealing and selling copyrighted information.
Anonymous Wages DDoS Attacks On Banks Worldwide
Quick Hits  |  5/10/2016  | 
Hacktivist group Anonymous launches month-long Operation Icarus to cripple global financial system.
10 Years Of Human Hacking: How The USB Way Evolved
Commentary  |  5/10/2016  | 
After a decade of clicking without consequence, users still havent gotten the message about the dangers of rogue USB devices with malware hidden inside.
Reuters: Police Say SWIFT Techs Made Bangladesh Bank More Vulnerable Before Heist
Quick Hits  |  5/9/2016  | 
SWIFT rejects 'baseless allegations' that software company's negligent security procedures had anything to do with $81 million wire transfer heist.
Liberty Reserve Founder Gets 20 Years For Money Laundering
Quick Hits  |  5/9/2016  | 
Convicted for virtual currencies laundering operations worth $8 billion.
Kroger Hit By W-2 Data Breach At Equifax
Quick Hits  |  5/9/2016  | 
Identity thieves stole tax and salary information, reports KrebsOnSecurity.
PCI DSS 3.2: Making the Move to MFA
Commentary  |  5/9/2016  | 
PCI DSS has always required that any untrusted, remote access into the cardholder data environment use multi-factor authentication. Now version 3.2 takes it one step further.
Terror Groups Using Legit, Home Grown Tools To Communicate, Proselytize
News  |  5/9/2016  | 
Trend Micro says its research shows that terror, cybercrime groups often use same tools to operate
<<   <   Page 2 / 3   >   >>

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-14
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could allow unauthorized access to the driver's device object.
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version, that could cause systems to experience a blue screen error.