2019 Pwnie Award Winners (And Those Who Wish They Weren't)
7 Online Safety Tips for College Students
8 Head-Turning Ransomware Attacks to Hit City Governments
Contest: Name That Toon
Moving on Up: Ready for Your Apps to Live in the Cloud?
News & Commentary
Cyberthreats Against Financial Services Up 56%
Dark Reading Staff, Quick Hits
Financial institutions interacting with customers online must prepare for a broader, more sophisticated variety of threats.
By Dark Reading Staff , 8/20/2019
Comment0 comments  |  Read  |  Post a Comment
Who Gets Privileged Access & How to Enforce It
Tim Keeler, Founder and CEO, RemediantCommentary
Let's begin by re-evaluating IT infrastructures to determine who has access to what, why, and when.
By Tim Keeler Founder and CEO, Remediant, 8/20/2019
Comment0 comments  |  Read  |  Post a Comment
Visa Adds New Fraud Disruption Measures
Steve Zurier, Contributing WriterNews
Payment card giant creates a 'cyber fraud system' to thwart transaction abuse.
By Steve Zurier Contributing Writer, 8/20/2019
Comment0 comments  |  Read  |  Post a Comment
5 Ways to Improve the Patching Process
Kacy Zurkus, Contributing Writer
So many software vulnerabilities, so little time. But failure to patch them can have serious consequences. Here's help for overwhelmed security teams.
By Kacy Zurkus Contributing Writer, 8/20/2019
Comment1 Comment  |  Read  |  Post a Comment
What Americans Think About Ransomware
Dark Reading Staff, Quick Hits
New Harris Poll survey says most will weigh candidates' cybersecurity positions.
By Dark Reading Staff , 8/19/2019
Comment0 comments  |  Read  |  Post a Comment
Instagram Added to Facebook Data-Abuse Bounty Program
Jai Vijayan, Contributing WriterNews
Social media giant also launches invitation-only bug bounty program for 'Checkout on Instagram'.
By Jai Vijayan Contributing Writer, 8/19/2019
Comment0 comments  |  Read  |  Post a Comment
Towns Across Texas Hit in Coordinated Ransomware Attack
Robert Lemos, Contributing WriterNews
The state government and cybersecurity groups have mobilized to respond to a mass ransomware attack that simultaneously hit 23 different towns statewide.
By Robert Lemos Contributing Writer, 8/19/2019
Comment0 comments  |  Read  |  Post a Comment
VxWorks TCP/IP Stack Vulnerability Poses Major Manufacturing Risk
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A new analysis shows the scale of risk posed by networking vulnerabilities in a popular embedded real-time operating system.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/19/2019
Comment0 comments  |  Read  |  Post a Comment
US Chamber of Commerce, FICO Report National Risk Score of 688
Dark Reading Staff, Quick Hits
While the score was up for large businesses and down for small firms, the report urges all to prioritize third-party risk management.
By Dark Reading Staff , 8/19/2019
Comment0 comments  |  Read  |  Post a Comment
Tough Love: Debunking Myths about DevOps & Security
Jeff Williams, CTO, Contrast SecurityCommentary
It's time to move past trivial 'shift left' conceptions of DevSecOps and take a hard look at how security work actually gets accomplished.
By Jeff Williams CTO, Contrast Security, 8/19/2019
Comment1 Comment  |  Read  |  Post a Comment
Modern Technology, Modern Mistakes
Kacy Zurkus, Contributing Writer
As employees grow more comfortable using new technologies, they could inadvertently be putting their enterprises at risk. And that leaves security teams having to defend an ever-expanding attack surface.
By Kacy Zurkus Contributing Writer, 8/19/2019
Comment0 comments  |  Read  |  Post a Comment
Compliance Training? What Compliance Training?
Beyond the Edge, Dark Reading
Employees can run ... but they can't hide. Or can they?
By Beyond the Edge Dark Reading, 8/19/2019
Comment0 comments  |  Read  |  Post a Comment
Google Analyzes Pilfered Password Reuse
Dark Reading Staff, Quick Hits
Password Checkup data shows some users still reuse their exposed passwords.
By Dark Reading Staff , 8/16/2019
Comment1 Comment  |  Read  |  Post a Comment
Project Zero Turns 5: How Google's Zero-Day Hunt Has Grown
Kelly Sheridan, Staff Editor, Dark ReadingNews
At Black Hat USA, Project Zero's team lead shared details of projects it has accomplished and its influence on the security community.
By Kelly Sheridan Staff Editor, Dark Reading, 8/16/2019
Comment1 Comment  |  Read  |  Post a Comment
European Central Bank Website Hit by Malware Attack
Dark Reading Staff, Quick Hits
The website was infected with malware that stole information on subscribers to a bank newsletter.
By Dark Reading Staff , 8/16/2019
Comment1 Comment  |  Read  |  Post a Comment
Beat the Heat: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
Phishing, token codes, training, MFA, polluted data entry, and whales. And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 8/16/2019
Comment0 comments  |  Read  |  Post a Comment
Behind the Scenes at ICS Village
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
ICS Village co-founder Bryson Bort reveals plans for research-dedicated events that team independent researchers, critical infrastructure owners, and government specialists.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/16/2019
Comment0 comments  |  Read  |  Post a Comment
More Than 20 Data Breaches Reported Per Day in First Half of 2019
Jai Vijayan, Contributing WriterNews
But incidents involving SSNs, addresses, birth dates were smaller than in previous years.
By Jai Vijayan Contributing Writer, 8/15/2019
Comment0 comments  |  Read  |  Post a Comment
NSA Researchers Talk Development, Release of Ghidra SRE Tool
Kelly Sheridan, Staff Editor, Dark ReadingNews
NSA researchers took the Black Hat stage to share details of how they developed and released the software reverse-engineering framework.
By Kelly Sheridan Staff Editor, Dark Reading, 8/15/2019
Comment0 comments  |  Read  |  Post a Comment
Adware, Trojans Hit Education Sector Hard
Robert Lemos, Contributing WriterNews
Students continue to be weak links for schools and universities, according to data from security firm Malwarebytes.
By Robert Lemos Contributing Writer, 8/15/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by ebyjeeby
Current Conversations

That's funny!

In reply to: Re: What's in your repository?
Post Your Own Reply
Posted by jrig1842
Current Conversations

I think I've found the problem, it's the key logger.

In reply to: Computer Mechanic
Post Your Own Reply
Posted by REISEN1955
Current Conversations

DO IT!!!!!!!!!!!   All the planning and good intents in the world are worthless unless somebody takes responsibility and actually DOES the patch upgrade, otherwise we create volumes of worthless protocols and...

In reply to: Point 7
Post Your Own Reply
Posted by Richard F.
Current Conversations

Thanks for making additional useful points in the Reply.

Actually a number of companies with limits far below USD $5 Million have been caught in this trap. The Montelone Hotel cyber coverage litigation in New...

In reply to: Re: Great Article - But There Are Dangerous Traps for Unwary
Post Your Own Reply
Posted by mcavanaugh1
Current Conversations

On your points...

First, you are correct.  The cyber insurance policies are not standardized.  There is no uniform coverage form like you would find in an Auto Insurance or Commercial General Liability...

In reply to: Re: Great Article - But There Are Dangerous Traps for Unwary
Post Your Own Reply
Posted by blightsey3921
Current Conversations

Time to change the spam filter !

In reply to: time to change the spam filter
Post Your Own Reply
Posted by kratiw
Current Conversations

In the "everything that is old is new again" category, I liken the push for security awareness to that of the WWII posters (try web search for "WWII security posters"). I'm sure WWII was the first time it was used. The...

In reply to: See WWII
Post Your Own Reply
Posted by LevA532
Current Conversations

Lifeguard: [ waving naval flags ] Slide back to the firewall! You are blocking the ports! Repeat! You are blocking the bubble ports!

[...]

Lifeguard: [ through bullhorn ] THE ENTIRE STAFF APPRECIATES...

In reply to: Lifeguard on Duty
Post Your Own Reply
Posted by Hackerproof Tech
Current Conversations

Thanks for the plain English explanation.

Understanding that certificates supposedly confirm that a given site is the actual site the issues surrounding them are:

1. they can...

In reply to: Are certificates really safe?
Post Your Own Reply
Posted by tdsan
Current Conversations

Also, a token could be issued by the company to validate their authenticity, this would be stored on the customer's browser or computer...

In reply to: Re: A new way of looking at a problem,
Post Your Own Reply
Posted by SSTOLFO000
Current Conversations

T

Very wise observation. (I've been a proponent of using ML in security since the inception of my lab at Columbia University, sponsored by DARPA, since 1996.) There are indeed companies that access and analyze...

In reply to: Re: A new way of looking at a problem,
Post Your Own Reply
Posted by tdsan
Current Conversations

"Fixing individual vulnerabilities matters," he said toward the end of his talk. In the next five years, one goal is to build a coalition...

In reply to: I think they already have something like this
Post Your Own Reply
More Conversations
PR Newswire