Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in September 2016
<<   <   Page 2 / 4   >   >>
7 Factors That Make Security Organizations More Effective
News  |  9/22/2016  | 
(ISC)2 members have plenty of technical chops, but IANS research found they need to focus more on how infosec aligns with the business.
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Commentary  |  9/22/2016  | 
Oliver Stones movie shows us that while most of us have nothing to hide, we all have information worth protecting both technically and constitutionally.
10 Ways To Lock Down Third-Party Risk
Slideshows  |  9/22/2016  | 
Experts share ideas for closing potential security holes that leave organizations open to attack.
Even A False Positive Can Be Valuable
Commentary  |  9/22/2016  | 
Sharing information about cyberthreats is important for the financial services industry, even when threats turn out to be not-so-threatening.
SWIFT CISO: Cyber Threat 'Persistent'
Quick Hits  |  9/22/2016  | 
Alain Desausoi describes threat as persistent, and says there's been progress in combating it via new SWIFT initiatives.
NYSE Deals Blow To John McAfee's MGT Capital
Quick Hits  |  9/22/2016  | 
MGT searches for alternatives as share listing approval denied, causing deep plunge in share price.
National Health ISAC Calls For Collaborative Vuln Disclosure
News  |  9/21/2016  | 
St. Jude Medical to host upcoming workshop on medical device info sharing, convened by NH-ISAC and medical device security consortium.
Majority Of Major Corporations Have User Credentials Stolen And Exposed
News  |  9/21/2016  | 
Companies in the entertainment and technology sectors are far more exposed than others, Digital Shadows analysis shows.
How Cloud, Mobile Are Changing IT, Security Management: Study
News  |  9/21/2016  | 
The evolution of technology is changing the role of IT and security pros as more employees use cloud apps and connect personal devices to corporate networks.
A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack
Commentary  |  9/21/2016  | 
This slightly modified model is a practical way to keep attackers out of your systems.
How Windows 10 Stops Script-Based Attacks On The Fly
How Windows 10 Stops Script-Based Attacks On The Fly
Dark Reading Videos  |  9/21/2016  | 
Move over Apple 'Walled Garden.' Windows 10's new antimalware scan interface halts scripts by signing code on the fly... but does it work? Security researcher Nikhil Mittal takes a look.
Rand Study: Average Data Breach Costs $200K, Not Millions
News  |  9/21/2016  | 
Rand taps multiple data sources to calculate that cyber incidents cost firms a scant 0.4% of annual revenues, on average.
Florida Man Charged With Hacking Linux Servers
Quick Hits  |  9/21/2016  | 
Donald Austin allegedly stole credentials of Linux employee to hack four company servers and install rootkit and Trojan software.
Chinese Researchers Hack Tesla S Models, Expose Bugs
Quick Hits  |  9/21/2016  | 
Automaker fixes security risks after Tencent Holdings uncover vulnerabilities in both parking and drive mode.
Education Now Suffers The Most Ransomware Attacks
News  |  9/21/2016  | 
New data shows ransomware rates worldwide doubling and tripling in past 12 months.
Zscaler Warns Of New iSpy Commercial Keylogger
News  |  9/20/2016  | 
Malware steals user data, license keys to popular applications.
Lack Of Funding Stymies State CISOs
News  |  9/20/2016  | 
Governors, other state officials more aware of cyber threats, but confidence gap exists between IT and business managers, new Deloitte-National State Chief Information Officers (NASCIO) study finds.
 How You Can Support InfoSec Diversity, Starting With The Colleagues You Already Have
How You Can Support InfoSec Diversity, Starting With The Colleagues You Already Have
Dark Reading Videos  |  9/20/2016  | 
Jamesha Fisher, Security Operations Engineer of GitHub, visits the Dark Reading News Desk at Black Hat to discuss her work making security more accessible to the uninitiated, and how a predominately white and male information security field can better support women and people of color.
Rise Of Machine Learning: Advancing Security With ML
Rise Of Machine Learning: Advancing Security With ML
Dark Reading Videos  |  9/20/2016  | 
Hal Lonas of Webroot drops by the Dark Reading News Desk at Black Hat.
Hacking 'Forward With Weaponized Intelligence
Commentary  |  9/20/2016  | 
Instead of hacking back and taking the fight to your adversary, what if your organization hacked forward by unearthing breach scenarios before the hackers do?
2016 On Track To See Over 1 Billion Records Breached
News  |  9/20/2016  | 
New report shows first half breach statistics put organizations on pace to beat last year's breach numbers by a wide margin.
Smartphone Infections Rise 96% In H1-2016: Malware Study
Quick Hits  |  9/20/2016  | 
Nokia report reveals April 2016 saw new all-time high in mobile infections with one out of every 120 smartphone affected.
Scientist Clones Chip To Unlock iPhone, Proves FBI Wrong
Quick Hits  |  9/20/2016  | 
Dr. Sergei Skorobogatov of Cambridge University spent $100 on a process that may have cost FBI $1 million.
Russia, Others Indeed Could Hack The Vote
News  |  9/19/2016  | 
DHS official 'confident' in electoral system security, but offers security assistance to localities and urges vigilance.
What Smart Cities Can Teach Enterprises About Security
Commentary  |  9/19/2016  | 
The more you simplify your security program while still being effective, the better, says San Diegos chief information security officer. Heres his three-step process.
The Time Is Now To Address The Cybersecurity Talent Shortage In Unique Ways
Partner Perspectives  |  9/19/2016  | 
Cultivating talent from unaccustomed outlets will benefit all of us.
Top Colleges For Cybersecurity
Slideshows  |  9/19/2016  | 
Check out these respected post-secondary U.S. cybersecurity education programs at both undergraduate and graduate levels.
The Future Of AI-Based Cybersecurity: It's Here Now
The Future Of AI-Based Cybersecurity: It's Here Now
Dark Reading Videos  |  9/19/2016  | 
Stuart McClure, president and CEO of Cylance, stops by the Dark Reading News Desk at Black Hat.
San Bernardino iPhone Hack: Media Agencies Sue FBI For Vendor Details
Quick Hits  |  9/19/2016  | 
Associated Press and two others invoke Freedom of Information Act against the government seeking details of secret transaction.
Whats The Risk? 3 Things To Know About Chatbots & Cybersecurity
Commentary  |  9/19/2016  | 
Interactive message bots are useful and becoming more popular, but they raise serious security issues.
FBI May Seek Legal Action Against Russian Hackers
Quick Hits  |  9/19/2016  | 
US government under pressure to take action against cyberattackers believed to be part of Russian intelligence groups, say sources.
Republican Lawmaker Withdraws Hack Allegations Saying He Misspoke
Quick Hits  |  9/16/2016  | 
Michael McCaul had earlier alleged that like DNC, the Republican National Committee computers were also breached by Russian hackers.
Central Banks Set Up Team To Oversee Cybersecurity
Quick Hits  |  9/16/2016  | 
Bangladesh Bank $81-million heist acts as a wake-up call to banks to protect inter-bank transfer networking from cyberattacks.
Uber, Dropbox, Other Tech Leaders Team Up To Boost Vendor Security
News  |  9/16/2016  | 
Tech companies - including Uber, Dropbox, Twitter, and Docker - have joined forces to create the Vendor Security Alliance, which aims to vet vendor security practices.
Why You May Need To Shake Up Your DevOps Team To Manage The Cloud
Commentary  |  9/16/2016  | 
The security approaches of yesterday wont work in the cloud world of today and tomorrow.
Google Chrome To Flag Non-HTTPS Logins, Credit Card Info 'Not Secure'
News  |  9/15/2016  | 
The move is part of a larger Google push to lock down Web traffic using encryption between the browser and Web server.
20 Questions Security Leaders Need To Ask About Analytics
Commentary  |  9/15/2016  | 
The game of 20 questions is a great way to separate vendors that meets your needs from those who will likely disappoint.
Sports Threat Intelligence-Sharing Group Formed
News  |  9/15/2016  | 
New information-sharing and analysis organization (ISAO) looks to provide threat intelligence to a broad range of professional and amateur sports organizations.
PLCs Possessed: Researchers Create 'Undetectable' Rootkit
News  |  9/15/2016  | 
New attack to be revealed at Black Hat Europe conference silently overtakes industrial network processes.
Students Say They'd Only Pay Ransomware Operators About $50
Quick Hits  |  9/15/2016  | 
Webroot survey finds that students will pay more to recover their private photos than to recover their schoolwork.
Data Loss Risks Rise In The Age Of Collaboration
News  |  9/15/2016  | 
Most organizations believe they have lost sensitive information due to external file sharing and third-party collaboration.
Yes, The Cloud Can Be A Security Win
Commentary  |  9/15/2016  | 
With the right controls in place, the cloud doesnt have to be a scary place. These guidelines can help your company stay safe.
Stop Blaming Users. Make Security User-Friendly.
Stop Blaming Users. Make Security User-Friendly.
Dark Reading Videos  |  9/15/2016  | 
Jelle Niemantsverdriet of Deloitte explains how security improves if security tools and error messages educate users and 'put a smile on someone's face.'
Olympic Athletes' Medical Data Compromised By Russian Hackers
Quick Hits  |  9/14/2016  | 
Sensitive details of Rio Olympic Games athletes compromised and released publicly by Fancy Bear, World Anti-Doping Agency says.
Microsoft Patches Zero Day Flaw Used In Two Massive Malvertising Campaigns
News  |  9/14/2016  | 
Bug gave attackers a way to identify and avoid systems belonging to security researchers and vendors, Proofpoint says.
Making The Dark Web Less Scary
Making The Dark Web Less Scary
Dark Reading Videos  |  9/14/2016  | 
Lance James, chief scientist at Flashpoint, stops by the Dark Reading News Desk to share his thoughts about the Dark Web.
France's Online Criminal Underground Built On Foundation Of Distrust
News  |  9/14/2016  | 
French criminals seeking black market goods and services -- cyber and otherwise -- have to look in darker shadows and work harder to prove their felonious credibility.
5 Law Enforcement & Emergency Response Bodies IT Departments Should Know
Slideshows  |  9/14/2016  | 
It's smart for businesses to strengthen their relationships with law enforcement before a cyberattack takes place. Whom should they contact, and how will it help after a breach?
Password Reuse: Dont Mix Business With Personal
Partner Perspectives  |  9/14/2016  | 
Employee education, password managers, and multifactor authentication can reduce the risk of a personal breach becoming a corporate security event.
Risk Management Best Practices For CISOs
Commentary  |  9/14/2016  | 
What's your company's risk appetite? Our list of best practices can help you better understand a difficult topic.
<<   <   Page 2 / 4   >   >>


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27706
PUBLISHED: 2021-04-14
Buffer Overflow in Tenda G1 and G3 routers with firmware version V15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/&quot;IPMacBindIndex &quot;request. This occurs because the &quot;formIPMacBindDel&quot; function directly passes the parameter &quot;IPMacBind...
CVE-2021-27707
PUBLISHED: 2021-04-14
Buffer Overflow in Tenda G1 and G3 routers with firmware v15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/&quot;portMappingIndex &quot;request. This occurs because the &quot;formDelPortMapping&quot; function directly passes the parameter &quot;portMappingIn...
CVE-2021-28098
PUBLISHED: 2021-04-14
An issue was discovered in Forescout CounterACT before 8.1.4. A local privilege escalation vulnerability is present in the logging function. SecureConnector runs with administrative privileges and writes logs entries to a file in %PROGRAMDATA%\ForeScout SecureConnector\ that has full permissions for...
CVE-2021-30493
PUBLISHED: 2021-04-14
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the ChromaBroadcast subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other wor...
CVE-2021-30494
PUBLISHED: 2021-04-14
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other wo...