News & Commentary

Content posted in July 2016
Page 1 / 3   >   >>
8 Bad Ass Tools Coming Out Of Black Hat
Slideshows  |  7/30/2016  | 
Penetration testing, reverse engineering and other security tools that will be explained and released at Black Hat 2016.
Second Democratic Party Website Hacked
News  |  7/29/2016  | 
In a DNC-like attack, pro-Russian hackers broke into a website belonging to the Democratic Congressional Campaign Committee -- and reportedly also the Clinton campaign website.
5 Things We Know So Far About The DNC Hack
Slideshows  |  7/29/2016  | 
The plot thickens this week as Donald Trump openly calls on Russia to release Hillary Clintons emails. All roads appear to lead to Russia in the DNC -- and now possibly the DCCC -- hacks.
South Korea: Cyberattack By North Korea Exposed Data Of 10 Million Consumers
Quick Hits  |  7/29/2016  | 
Personal data of visitors to online shopping portal stolen, says South Korea police.
DNC Leak: US Intel Chief Says It's Too Soon To Attribute Blame
Quick Hits  |  7/29/2016  | 
James Clapper suggests the email leak was an act by a nation-state and not some hacking group.
How to Roll Your Own Threat Intelligence Team
Commentary  |  7/29/2016  | 
A lot of hard work needs to go into effectively implementing an intelligence-driven security model. It starts with five critical factors.
Google Adds New Kernel-Level Protections For Android
News  |  7/28/2016  | 
Measures include kernel memory controls and features to reduce attack surface.
Multiple Major Security Products Open To Big Vulns Via 'Hooking Engines'
News  |  7/28/2016  | 
Black Hat USA talk will show how flawed implementation of hooking techniques are putting security and other software at risk.
KPMG Study: Breaches Up, Security Spending Down
News  |  7/28/2016  | 
81 percent admitted to a recent breach but less than half said they'd invested more in security as a result
How To Stay Safe On The Black Hat Network: Dont Connect To It
Commentary  |  7/28/2016  | 
Black Hat attendees may have changed their titles and now carry business cards but hackers gotta hack and theres no better place to do it than Black Hat.
Ex-Citibank Worker Jailed For Sabotage Of Network
Quick Hits  |  7/28/2016  | 
Revenge motive behind employee's actions that disrupted the network of 110 Citibank branches across the US.
Legal Sector's Threat Intel-Sharing Group Grows
Quick Hits  |  7/28/2016  | 
LS-ISAO is 'the fastest-growing' ISAO.
HHS Penalizes Philadelphia Healthcare Organization For HIPAA Violation
News  |  7/27/2016  | 
Catholic Health Care Services of the Archdiocese of Philadelphia agrees to pay $650,000 fine over 2014 data breach.
7 Ways To Charm Users Out of Their Passwords
Slideshows  |  7/27/2016  | 
While the incentives have changed over time, it still takes remarkably little to get users to give up their passwords.
The Internet Of Tiny Things: What Lurks Inside
Commentary  |  7/27/2016  | 
Hackers can now use a tiny $2 embedded chip -- at scale -- to launch thousands of infected 'things' out into the ether to capture data and soften consumers up for an attack.
Vixies Farsight Rolls Out Its First Enterprise DNS Security Service
News  |  7/27/2016  | 
DNS expert aims for proactive protection, defense of organizations' online domains.
Russia Rejects DNC Breach Allegations As 'Old Trick'
Quick Hits  |  7/27/2016  | 
Kremlin dubs US charges of its involvement in hack of Democratic National Committee email system as mere attempts to exploit Russia during US election season.
Kimpton Hotel Chain Investigating Possible Payment Card Breach
Quick Hits  |  7/27/2016  | 
Around 24 properties of Kimpton Hotels across US likely affected.
Cybersecurity Skills Shortage Puts Organizations At Risk, Study Shows
News  |  7/27/2016  | 
The oft-discussed and lamented cybersecurity skills gap isnt just a hiring issue, its putting your organization at risk, Intel Security-CSIS study finds.
Obama Issues Federal Government Policy For Cyberattack Response
News  |  7/26/2016  | 
New Presidential Policy Directive, PPD-41, solidifies just how key federal agencies coordinate, respond to cyberattacks on federal and private networks.
In Security, Know That You Know Nothing
Commentary  |  7/26/2016  | 
Only when security professionals become aware of what they dont know, can they start asking the right questions and implementing the right security controls.
Russia Likely Behind DNC Breach, Says FBI
Quick Hits  |  7/26/2016  | 
Motive behind DNC hack and leak is possibly to tilt election in favor of Trump, say US officials.
Report Finds Healthcare Most Targeted By Ransomware
Quick Hits  |  7/26/2016  | 
Top ransomware variant Cryptowall accounts for almost 94% of all detected attacks, says Solutionary.
Security Holes Exposed In Smart Lighting System
News  |  7/26/2016  | 
Sylvania Osram Lightify vulnerabilities could allow an attacker to turn out the lights or ultimately infiltrate the corporate network.
'MouseJack' Researchers Uncover Major Wireless Keyboard Vulnerability
News  |  7/26/2016  | 
KeySniffer attack shows two-thirds of low-cost wireless keyboards prone to keystroke capture and malicious keystroke injection.
SentinelOne Offers $1 Million Guarantee To Stop Ransomware
News  |  7/26/2016  | 
Jeremiah Grossman continues his crusade to make security vendors take responsibility for their own gear.
New Portal Offers Decryption Tools For Some Ransomware Victims
News  |  7/25/2016  | 
Nomoreransom.org, a joint initiative between Europol, the Dutch National Police, Kaspersky Lab and Intel Security, offers help in getting encrypted data back.
10 Hottest Talks at Black Hat USA 2016
Slideshows  |  7/25/2016  | 
The impressive roll call of speakers offers a prime opportunity to learn from the very best of the information security world.
Edward Snowden Designs Anti-Spying Smartphone Device
Quick Hits  |  7/25/2016  | 
'Introspection engine' will reportedly protect journalists, others, from revealing locations through unauthorized radio signals.
Three Arrested For Cell Phone Hacking Scam
Quick Hits  |  7/25/2016  | 
Defendants accused of using stolen phone details to make international calls charged to victims accounts.
Building Black Hat: Locking Down One Of The Worlds Biggest Security Conferences
Commentary  |  7/25/2016  | 
For security pros, being asked to help secure Black Hat is like being asked to play on the Olympic basketball team.
How Jihadists Operate Online And Under The Radar: Report
News  |  7/22/2016  | 
Secure browsers, VPNs, protected email apps, and mobile security apps are just tip of iceberg, Flashpoint report shows.
5 Ways To Protect HR From Ransomware
News  |  7/22/2016  | 
Bad actors are now looking to hold for ransom sensitive information stored in personnel records in the human resources department and other highly sensitive corporate operations.
7 Ways To Lock Down Your Privileged Accounts
Slideshows  |  7/22/2016  | 
Admin passwords contained within privileged accounts can open up the keys to the kingdom to determined attackers. Here's how to stop them.
5 Failsafe Techniques For Interviewing Security Candidates
Commentary  |  7/22/2016  | 
Filling critical information security roles with the right people is never easy. But learning how to separate the 'wheat from the chaff' is a smart step in the right direction.
Asia Mulls Europol-Style Agency To Fight Cybercrime
Quick Hits  |  7/22/2016  | 
Asian ministers hold closed-door meeting in Singapore to chalk out strategy for such an organization.
Auto Industry ISAC Releases Best Practices For Connected Vehicle Cybersecurity
News  |  7/21/2016  | 
Goal is to provide car manufactures with guidelines for protecting modern vehicles against emerging cyber threats
Majority Of Companies Say Trade Secrets Likely Compromised
News  |  7/21/2016  | 
About 60 percent of companies in a survey by Ponemon and Kilpatrick Townsend say at least some of their trade secrets are likely in the hands of rivals
Tools & Training To Hack Yourself Into Better Security
Commentary  |  7/21/2016  | 
How to teach your blue team to think like the red team when your network is under attack and time is your most valuable asset.
Teslas Data Collection May Help In Autopilot Defense
Quick Hits  |  7/21/2016  | 
The automotive company can use its data collection software to fight liability if involved in Florida crash case, say lawyers.
Firefox To Start Blocking Invisible Flash Content
Quick Hits  |  7/21/2016  | 
This move is part of campaign by Mozilla to close the door on Flash completely by 2017.
Security Gets Political With Hacks, Darknet Sales
News  |  7/21/2016  | 
As presidential campaigns get into full swing, neither party is immune to online chicanery -- and neither are voters
Five Ingredients Of An Intelligence-Driven Security Operations Center: Part 3 In A Series
Partner Perspectives  |  7/21/2016  | 
As enterprises adopt new ways of thinking about security, they also must make changes in their operations centers to support the new mindset. Heres whats needed.
National Governors Association Seeks Higher Profile on Cybersecurity
News  |  7/20/2016  | 
NGAs new chairman Virginia Gov. Terry McAuliffe says states can play a pivotal role in cybersecurity, including emergency response, workforce development and protecting health care data.
Improving Attribution & Malware Identification With Machine Learning
News  |  7/20/2016  | 
New technique may be able to predict not only whether unfamiliar, unknown code is malicious, but also what family it is and who it came from.
5 Mr. Robot Hacks That Could Happen in Real Life
Commentary  |  7/20/2016  | 
As season two of the popular TV series gets underway, we reality-check anti-hero Elliots hacking prowess against real-life security and attack scenarios.
Security Meaningful If Brought In Early Into Projects: Survey
Quick Hits  |  7/20/2016  | 
Dell study says many see security as an obstacle to digital initiatives and bring in too late to make an impact.
Ex-Cardinal Exec Jailed For Hacking Astros
Quick Hits  |  7/20/2016  | 
Christopher Correa gets 46 months for unlawful access of rivals database and downloading confidential details.
Remote Systems Admin Software Rigged With Lurk Trojan
News  |  7/19/2016  | 
Website of legitimate and popular application used by banks in Russia and nearby nations faced successive compromises.
Deconstructing Connected Cars: A Hack Waiting To Happen
Commentary  |  7/19/2016  | 
Why your automobiles simple and reliable Controller Area Network will put you at risk in the brave new world of connected and autonomous driving.
Page 1 / 3   >   >>


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11354
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
CVE-2018-11355
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
CVE-2018-11356
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
CVE-2018-11357
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
CVE-2018-11358
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.