Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in August 2016
<<   <   Page 3 / 3
Data Protection From The Inside Out
Commentary  |  8/8/2016  | 
Organizations must make fundamental changes in the way they approach data protection.
New Internet Security Domains Debut
News  |  8/5/2016  | 
Meet the new .security and .protection domains.
DHS Mulls Designating US Election System As Critical Infrastructure
Quick Hits  |  8/5/2016  | 
DHS studying whether election system should fall under DHS cyber-protection purview.
Cybersecurity Fears Among Consumers On The Rise
Quick Hits  |  8/5/2016  | 
Digital Citizens Alliance poll reveals nearly half of Americans have been victims of cyber fraud.
Team With Carnegie Mellon Roots Wins Machine Hacking Contest
News  |  8/5/2016  | 
'Mayhem' takes home $2 million prize in historic DARPA machine-to-machine hacking challenge.
Theres Something Phishy in the Package
Partner Perspectives  |  8/5/2016  | 
The typosquatting risk is real. Its time to increase our vigilance and control over third-party source code.
Apple Finally Launches Bug Bounty Program
News  |  8/4/2016  | 
Security researchers will be eligible for bounties of up to $200,000. But for the moment the program is invite-only
DDoS Attacks: Cybercriminals Are More Homegrown Than You Think
News  |  8/4/2016  | 
Researchers from the FBI and a private security company say many of the distributed denial of service attacks emanate from the West.
Dark Reading News Desk Coming Back To Black Hat, Live
News  |  8/4/2016  | 
Live from Las Vegas: over 40 video interviews with Black Hat USA conference speakers and sponsors. Wednesday Aug. 3, Thursday Aug, 4, starting at 2 p.m. ET.
FBI Reportedly Took Months To Warn DNC That Russia May Be Behind Hackings
Quick Hits  |  8/4/2016  | 
Full disclosure may have lessened damage but official says agency was acting in national interest.
Hacker Creates Software Ratings System
Quick Hits  |  8/4/2016  | 
The new formula to rate computer software could force creators to perform better, says Peiter Mudge Zatko.
Nigerian Prince All Grown Up And Bilking Millions From Businesses Via BEC
News  |  8/4/2016  | 
Researchers discover leader of wire-wire gang thats made millions off by laundering victims business transactions.
8 Alternatives to Selfie Authentication
Slideshows  |  8/4/2016  | 
How to definitively prove your identity? A variety of anatomical parts and functions may soon be able to vouch for you.
Do Security Companies Need to Issue Warranties?
News  |  8/3/2016  | 
Jeremiah Grossman outlines how IT security firms are starting to offer guarantees with the backing of insurance companies.
Best Of Black Hat Innovation Awards: And The Winners Are
Commentary  |  8/3/2016  | 
Three companies and leaders who think differently about security: Deep Instinct, most innovative startup; Vectra, most innovative emerging company; Paul Vixie, most innovative thought leader.
Researchers Show How To Steal Payment Card Data From PIN Pads
News  |  8/3/2016  | 
Attack works even against chip-enabled EMV smartcards.
Kaminsky Creates Prototype To Lock Out Attackers
News  |  8/3/2016  | 
Security expert warns the Internet could be lost to regulators and hackers if industry doesn't start locking down security.
Georgia Man Pleads Guilty To Hacking, Insider Trading
Quick Hits  |  8/3/2016  | 
Leonid Momotok breached newswire networks and used confidential data for illegal trades worth $30 million.
US Navy Organizes Cybersecurity Simulation
Quick Hits  |  8/3/2016  | 
Naval interns create 'Capture the Flag' challenge to protect US Navy cyberspace.
Hotel POS and Magstripe Cards Vulnerable to Attacks, Brute-Forcing
News  |  8/2/2016  | 
Researchers from Rapid7 at DefCon will demonstrate vulnerabilities that allow attackers to turn point-of-sale devices into keyboards
Awareness Improving But Security Still Lags For SAP Implementations
News  |  8/2/2016  | 
SAP ecosystem a huge Achilles heel for enterprise system security, report says.
Dark Reading Radio at Black Hat 2016: 2 Shows, 4 #BHUSA Presenters
Commentary  |  8/2/2016  | 
Even if you can't physically be at Black Hat USA 2016, Dark Reading offers a virtual alternative to engage with presenters about hot show topics and trends.
5 Email Security Tips to Combat Macro-Enabled Ransomware
Slideshows  |  8/2/2016  | 
Cybercriminals are increasingly looking to macro variants, leaving organizations to defend against advanced tactics like macro-based malware attacks any way they can.
BEC Scam Mastermind Arrested By Interpol
Quick Hits  |  8/2/2016  | 
Nigerian national charged with corporate email fraud of more than $60 million.
Clinton Campaign To Hold Cybersecurity-Themed Fundraiser In Vegas
Quick Hits  |  8/2/2016  | 
Cybersecurity experts to head event during the ongoing Black Hat hacker conference this week.
3 Steps Towards Building Cyber Resilience Into Critical Infrastructure
Commentary  |  8/2/2016  | 
The integration of asset management, incident response processes and education is critical to improving the industrial control system cybersecurity landscape.
How the Adoption of EDR Transforms a SOCs Effectiveness
Partner Perspectives  |  8/2/2016  | 
Endpoint detection response is helping take the headache out of responding to threats by providing visibility where most organizations are blind.
Kaspersky Lab Kicks Off Its First Bug Bounty Program
News  |  8/2/2016  | 
Security vendor teams up with HackerOne to pay out $50K to researchers over next six months.
This Time, Miller & Valasek Hack The Jeep At Speed
News  |  8/1/2016  | 
Car hacking duo accelerates -- literally -- their epic Jeep Cherokee hack.
Browser Exploits Increasingly Go For The Jugular
News  |  8/1/2016  | 
Black Hat USA panel to discuss browser attacks, which now go from browser userland to root privileges in no time flat.
Clinton Campaign: Voter Analytics Program Compromised, Not Internal Systems
Quick Hits  |  8/1/2016  | 
First the DNC, then the DCCC, and now the Clinton campaign have all been compromised by Russian attackers.
White-Hat Hacking Group Founder Arrested In China
Quick Hits  |  8/1/2016  | 
Chinese police crack down on ethical hacking community for undisclosed reasons, detain 10 members.
Crypto Malware: Responding To Machine-Timescale Breaches
Commentary  |  8/1/2016  | 
The game has changed again with hackers ability to steal your data at record speeds and cripple your organization before the first alert.
<<   <   Page 3 / 3


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-39220
PUBLISHED: 2021-10-25
Nextcloud is an open-source, self-hosted productivity platform The Nextcloud Mail application prior to versions 1.10.4 and 1.11.0 does by default not render images in emails to not leak the read state or user IP. The privacy filter failed to filter images with a relative protocol. It is recommended ...
CVE-2021-39221
PUBLISHED: 2021-10-25
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due th...
CVE-2021-41176
PUBLISHED: 2021-10-25
Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. In affected versions of Pterodactyl a malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted at...
CVE-2021-34854
PUBLISHED: 2021-10-25
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within ...
CVE-2021-34855
PUBLISHED: 2021-10-25
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exi...