Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Authentication

News & Commentary
BioStar 2 Leak Exposes 23GB Data, 1M Fingerprints
Dark Reading Staff, Quick Hits
Thousands of organizations, including banks, governments, and the UK Metropolitan Police, use the biometric security tool to authenticate users.
By Dark Reading Staff , 8/14/2019
Comment1 Comment  |  Read  |  Post a Comment
2019 Pwnie Award Winners (And Those Who Wish They Weren't)
Jai Vijayan, Contributing Writer
This year's round-up includes awards into two new categories: most under-hyped research and epic achievement.
By Jai Vijayan Contributing Writer, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
More Focus on Security as Payment Technologies Proliferate
Robert Lemos, Contributing WriterNews
Banks and merchants are expanding their payment offerings but continue to be wary of the potential fraud risk.
By Robert Lemos Contributing Writer, 8/12/2019
Comment0 comments  |  Read  |  Post a Comment
State Farm Reports Credential-Stuffing Attack
Dark Reading Staff, Quick Hits
The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.
By Dark Reading Staff , 8/9/2019
Comment1 Comment  |  Read  |  Post a Comment
It's (Still) the Password, Stupid!
Sam Bocetta, Security AnalystCommentary
The best way to protect your identity in cyberspace is the simplest: Use a variety of strong passwords, and never, ever, use "123456" no matter how easy it is to type.
By Sam Bocetta Security Analyst, 8/9/2019
Comment3 comments  |  Read  |  Post a Comment
Researchers Show Vulnerabilities in Facial Recognition
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The algorithms that check for a user's 'liveness' have blind spots that can lead to vulnerabilities.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/7/2019
Comment1 Comment  |  Read  |  Post a Comment
Mimecast Rejected Over 67 Billion Emails. Here's What It Learned
Steve Zurier, Contributing WriterNews
New research warns that security pros must guard against updates to older malware and more manipulative social-engineering techniques.
By Steve Zurier Contributing Writer, 8/6/2019
Comment3 comments  |  Read  |  Post a Comment
Demystifying New FIDO Standards & Innovations
Bojan Simic, Chief Technology Officer & Co-Founder of HYPRCommentary
Staying on top of the latest cybersecurity risks and preferred attack methods can feel impossible, but standards like FIDO2 are designed to help relieve the burden.
By Bojan Simic Chief Technology Officer & Co-Founder of HYPR, 8/1/2019
Comment0 comments  |  Read  |  Post a Comment
Google Cloud Debuts New Security Capabilities
Dark Reading Staff, Quick Hits
Updates include Advanced Protection Program for the enterprise and general availability of password vaulted apps in Cloud Identity and G Suite.
By Dark Reading Staff , 7/31/2019
Comment3 comments  |  Read  |  Post a Comment
More Companies Don't Rely on Passwords Alone Anymore
Steve Zurier, Contributing WriterNews
New research shows how enterprises are adding additional layers of authentication.
By Steve Zurier Contributing Writer, 7/31/2019
Comment0 comments  |  Read  |  Post a Comment
8 Free Tools to Be Showcased at Black Hat and DEF CON
Ericka Chickowski, Contributing Writer
Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.
By Ericka Chickowski Contributing Writer, 7/31/2019
Comment0 comments  |  Read  |  Post a Comment
Keep Your Eye on Digital Certificates
Terry Sweeney, Contributing Editor
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
By Terry Sweeney Contributing Editor, 7/31/2019
Comment1 Comment  |  Read  |  Post a Comment
Transforming 'Tangible Security' into a Competitive Advantage
Kaan Onarlioglu, Security Architect, AkamaiCommentary
Today's consumers want to see and touch security. Meeting this demand will be a win-win for everyone, from users to vendors to security teams.
By Kaan Onarlioglu Security Architect, Akamai, 7/30/2019
Comment0 comments  |  Read  |  Post a Comment
Farewell, Dear Password? The Future of Identity and Authorization
Kacy Zurkus, Contributing Writer
Many organizations are questioning whether eliminating passwords as an authentication tool would augment their overall security posture.
By Kacy Zurkus Contributing Writer, 7/30/2019
Comment1 Comment  |  Read  |  Post a Comment
VPNs' Future: Less Reliant on Users, More Transparent, And Smarter
Terry Sweeney, Contributing Editor
Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the IoT need protection.
By Terry Sweeney Contributing Editor, 7/24/2019
Comment2 comments  |  Read  |  Post a Comment
A Password Management Report Card
Maxine Holt, Research Director, OvumCommentary
New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings.
By Maxine Holt Research Director, Ovum, 7/17/2019
Comment0 comments  |  Read  |  Post a Comment
Security Snapshot: OS, Authentication, Browser & Cloud Trends
Kelly Sheridan, Staff Editor, Dark ReadingNews
New research shows cloud apps are climbing, SMS authentication is falling, Chrome is the enterprise browser favorite, and Android leads outdated devices.
By Kelly Sheridan Staff Editor, Dark Reading, 7/16/2019
Comment0 comments  |  Read  |  Post a Comment
Symantec Builds Out Cloud Portfolio to Enforce 'Zero Trust'
Dark Reading Staff, Quick Hits
New additions to its Integrated Cyber Defense Platform aim to give businesses greater control over access to cloud resources and applications.
By Dark Reading Staff , 7/16/2019
Comment1 Comment  |  Read  |  Post a Comment
Competing Priorities Mean Security Risks for Small Businesses
Dark Reading Staff, Quick Hits
Small business IT professionals are trying to balance multiple priorities and finding that the balance often leaves the company with serious security risks.
By Dark Reading Staff , 7/12/2019
Comment6 comments  |  Read  |  Post a Comment
Organizations Are Adapting Authentication for Cloud Applications
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Companies see the changing demands of cloud identity management but are mixed in their responses to those demands.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/9/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15237
PUBLISHED: 2019-08-20
Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, leading to homograph attacks.
CVE-2019-15228
PUBLISHED: 2019-08-20
FUEL CMS 1.4.4 has XSS in the Create Blocks section of the Admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account but can also impact unauthenticated visitors.
CVE-2019-15229
PUBLISHED: 2019-08-20
FUEL CMS 1.4.4 has CSRF in the blocks/create/ Create Blocks section of the Admin console. This could lead to an attacker tricking the administrator into executing arbitrary code via a specially crafted HTML page.
CVE-2019-15231
PUBLISHED: 2019-08-20
Webmin 1.890, in a default installation, contains a backdoor that allows an unauthenticated attacker to remotely execute commands. This is different from CVE-2019-15107. NOTE: as of 2019-08-19, the vendor reports that "at some point" malicious code was inserted into their build infrastruct...
CVE-2019-15232
PUBLISHED: 2019-08-20
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaServer::createNewClientSessionWithId can generate the same client session ID in succession, which is mishandled by the MPEG1or2 and Matroska file demultiplexors.