News & Commentary

Content tagged with Identity & Access Management posted in November 2016
Cybersecurity User Training That Sticks: 3 Steps
Commentary  |  11/29/2016
People are eager for common-sense advice that gives them control over their environment and helps them stay safe online.
Symantec To Buy LifeLock At $2.3 Billion
Quick Hits  |  11/22/2016
Deal set to be finalized by Q1 2017 and financed by cash and $750 million of new debt.
WindTalker Attack Finds New Vulnerabilities in Wi-Fi Networks
News  |  11/21/2016
White hat researchers show how hackers read keystrokes to potentially compromise cellphone and tablet users on public Wi-Fi and home networks.
5 Ways Retailers Can Stay Safe Over the Holidays
Slideshows  |  11/21/2016
E-commerce experts offer tips for locking down systems as the busy holiday season approaches.
Cyber Monday, Consumers & The Bottom Line Of A Data Breach
Commentary  |  11/18/2016
Yes retailers can achieve ROI for their investments in cybersecurity during the upcoming holiday season - and for the rest of the year, too! Heres how.
Thinking Ahead: Cybersecurity In The Trump Era
News  |  11/18/2016
In a panel held by the University of California Berkeley Center for Long-Term Cybersecurity and Bipartisan Policy Center, experts discuss challenges facing the incoming presidential administration.
China's Jinping Opens Tech Meet With Calls For 'Fair & Equitable' Internet
Quick Hits  |  11/18/2016
The third Wuzhen World Internet Conference had a strong presence of US tech companies despite criticism of Chinas Internet laws.
Teenager Admits To TalkTalk Hack
Quick Hits  |  11/18/2016
A 17-year-old boy exploited flaws in ISPs web pages to steal confidential data of 150,000 customers.
NIST Releases Version of Cybersecurity Framework for Small Businesses
News  |  11/17/2016
Researchers offer a step-by-step approach for covering the basics of cybersecurity.
Insider Threat: The Domestic Cyber Terrorist
Commentary  |  11/17/2016
It is dangerously naive for business and government leaders to dismiss the risk of radicalized privileged users inside our critical industries.
8 Public Sources Holding 'Private' Information
Slideshows  |  11/17/2016
Personal information used for nefarious purposes can be found all over the web from genealogy sites to public records and social media.
'Snoopers Charter' Set To Become Law In UK
Quick Hits  |  11/17/2016
Surveillance bill goes through British Parliament and awaits only the Royal assent to become law before the year ends.
The 7 Most Significant Government Data Breaches
Slideshows  |  11/15/2016
Mega compromises at federal and state agencies over the past three years has compromised everything from personal data on millions to national security secrets.
Shoppers Up Their Online Security Game, Survey Says
News  |  11/10/2016
While they check SSL certificates and liability policies more often, many remain wary of biometric authentication, Computop reports
Stay Vigilant To The Evolving Threat Of Social Engineering
Commentary  |  11/8/2016
Even the most cyber-savvy individuals can easily get tripped up by a social engineering attack. But users can trip-up a threat simply by paying attention.
Election 2016 & WikiLeaks: Bad, But Not Your Worst Nightmare
Commentary  |  11/4/2016
John Podesta may be the poster child for poor user security practices but the real problem is rigid regulatory compliance frameworks that perpetuate ineffective perimeter defenses.
Why Enterprise Security Teams Must Grow Their Mac Skills
Commentary  |  11/1/2016
From coffee shops to corporate boardrooms, Apple devices are everywhere. So why are organizations so doggedly focused on Windows-only machines?
7 Reasons Consumers Dont Take Action on Cybersecurity
Slideshows  |  11/1/2016
Security awareness is high but its hard to turn personal knowledge into effective practices.

Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
Microsoft Report Details Different Forms of Cryptominers
Kelly Sheridan, Staff Editor, Dark Reading,  3/13/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.