Endpoint

News & Commentary
GDPR Oddsmakers: Who, Where, When Will Enforcement Hit First?
Sara Peters, Senior Editor at Dark ReadingNews
The GDPR grace period ends today. Experts take their best guesses on when data protection authorities will strike - and what kind of organizations will be first to feel the sting of the EU privacy law.
By Sara Peters Senior Editor at Dark Reading, 5/25/2018
Comment0 comments  |  Read  |  Post a Comment
Privacy Survey Says: Americans Don't Want to Sell Their Data
Dark Reading Staff, Quick Hits
A new survey shows the extent to which Americans are reluctant to sell their personal information for any price.
By Dark Reading Staff , 5/25/2018
Comment1 Comment  |  Read  |  Post a Comment
Privacy Group: Facebook, Google Policies Break GDPR Laws
Dark Reading Staff, News
Nonprofit 'None of Your Business' files complaints against Facebook, Google, WhatsApp, and Instagram.
By Dark Reading Staff , 5/25/2018
Comment0 comments  |  Read  |  Post a Comment
Wicked Mirai Brings New Exploits to IoT Botnets
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The latest variant of the venerable Mirai botnet malware combines approaches and brings new exploits to the world of IoT security challenges.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/25/2018
Comment0 comments  |  Read  |  Post a Comment
Most Expensive Data Breaches Start with Third Parties: Report
Kelly Sheridan, Staff Editor, Dark ReadingNews
Data breach costs increased 24% for enterprise victims and 36% for SMBs from 2017 to 2018, researchers found.
By Kelly Sheridan Staff Editor, Dark Reading, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
DOJ Sinkholes VPNFilter Control Servers Found in US
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
The US Department of Justice said the move aims to thwart the spread of the botnet as part of its investigation into Russian nation-state hacking group APT28 aka Fancy Bear.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
GDPR, WHOIS & the Impact on Merchant Risk Security Monitoring
Ron Teicher, CEO & Founder, EverCompliantCommentary
The EU's General Data Protection Regulation will make it harder for law enforcement, forensic investigators, and others to track down everything from credit card fraud to child porn rings.
By Ron Teicher CEO & Founder, EverCompliant, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
A Data Protection Officer's Guide to the Post-GDPR Deadline Reality
Jen Brown, Compliance and Data Protection Officer at Sumo LogicCommentary
The EU's General Data Protection Regulation deadline is here -- now what? These four tips can help guide your next steps.
By Jen Brown Compliance and Data Protection Officer at Sumo Logic, 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
Malwarebytes Buys Binisoft for Firewall Management
Dark Reading Staff, Quick Hits
Vendor plans to integrate Binisoft's Windows Firewall Control into the Malwarebytes endpoint protection platform.
By Dark Reading Staff , 5/24/2018
Comment0 comments  |  Read  |  Post a Comment
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Users are terrible at passwords and the problem is only getting worse, according to an expansive study of more than 100 million passwords and their owners.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/24/2018
Comment3 comments  |  Read  |  Post a Comment
The Good & Bad News about Blockchain Security
Michael Raziel, CTO, CyberGuild VenturesCommentary
Blockchain technology promises many things. But to succeed, it must offer users a better plan against hackers.
By Michael Raziel CTO, CyberGuild Ventures, 5/23/2018
Comment0 comments  |  Read  |  Post a Comment
What Should Post-Quantum Cryptography Look Like?
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/23/2018
Comment1 Comment  |  Read  |  Post a Comment
Windows 10 Adoption Grew 75%, Adobe Flash Plummeted 188% in 2017: Report
Kelly Sheridan, Staff Editor, Dark ReadingNews
Authentication data reveals an increase in Apple devices, poor mobile security, and the rapid disappearance of Flash from browsers.
By Kelly Sheridan Staff Editor, Dark Reading, 5/23/2018
Comment1 Comment  |  Read  |  Post a Comment
US Senator to DOD CIO: 'Take Immediate Action' on HTTPS
Kelly Sheridan, Staff Editor, Dark ReadingNews
US Senator Ron Wyden pens a letter to the Department of Defense CIO, urging stronger security on public-facing government sites.
By Kelly Sheridan Staff Editor, Dark Reading, 5/22/2018
Comment0 comments  |  Read  |  Post a Comment
Cybercriminals Battle Against Banks' Incident Response
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
'Filess' attacks account for more than half of successful breaches of bank networks, new data shows.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/22/2018
Comment0 comments  |  Read  |  Post a Comment
GDPR 101: Keeping Data Safe Throughout the 'Supply Chain'
Marc French, Senior VP, Chief Trust Officer & Data Protection Officer, MimecastCommentary
There are a lot of moving pieces involved with data collection, retention, and processing in the EU's new General Data Protection Regulation. Here's how to break down responsibilities between your security team and service providers.
By Marc French Senior VP, Chief Trust Officer & Data Protection Officer, Mimecast, 5/22/2018
Comment0 comments  |  Read  |  Post a Comment
ZipperDown Vulnerability Could Hit 10% of iOS Apps
Dark Reading Staff, Quick Hits
A newly discovered vulnerability could affect thousands of iOS apps -- and Android users may not be spared.
By Dark Reading Staff , 5/22/2018
Comment1 Comment  |  Read  |  Post a Comment
Pet Tracker Flaws Expose Pets and Their Owners to Cybercrime
Dark Reading Staff, Quick Hits
Hackers can exploit vulnerabilities in popular pet trackers to intercept location coordinates and access owners' personal data.
By Dark Reading Staff , 5/22/2018
Comment1 Comment  |  Read  |  Post a Comment
North Korean Defectors Targeted with Malicious Apps on Google Play
Kelly Sheridan, Staff Editor, Dark ReadingNews
Sun Team hacking group is behind RedDawn, which steals victims' photos and data and passes them to threat actors.
By Kelly Sheridan Staff Editor, Dark Reading, 5/21/2018
Comment0 comments  |  Read  |  Post a Comment
New BIND Vulnerabilities Threaten DNS Availability
Dark Reading Staff, Quick Hits
A pair of vulnerabilities in BIND could leave some organizations without DNS.
By Dark Reading Staff , 5/21/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.